Nothing Special   »   [go: up one dir, main page]

US9166974B2 - Captcha systems and methods - Google Patents

Captcha systems and methods Download PDF

Info

Publication number
US9166974B2
US9166974B2 US14/641,068 US201514641068A US9166974B2 US 9166974 B2 US9166974 B2 US 9166974B2 US 201514641068 A US201514641068 A US 201514641068A US 9166974 B2 US9166974 B2 US 9166974B2
Authority
US
United States
Prior art keywords
captcha
cognitive
heteronym
human
words
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US14/641,068
Other versions
US20150180856A1 (en
Inventor
Gary Stephen Shuster
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US14/641,068 priority Critical patent/US9166974B2/en
Publication of US20150180856A1 publication Critical patent/US20150180856A1/en
Priority to US14/887,227 priority patent/US9467436B2/en
Application granted granted Critical
Publication of US9166974B2 publication Critical patent/US9166974B2/en
Priority to US15/289,767 priority patent/US9860247B2/en
Priority to US15/852,740 priority patent/US10298569B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/065Continuous authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/20Aspects of automatic or semi-automatic exchanges related to features of supplementary services
    • H04M2203/2027Live party detection

Definitions

  • a computer system configured to validate language CAPTCHAs comprises one or more hardware processors programmed via executable code instructions. When executed, the executable code instructions may cause the computer system to implement a CAPTCHA generator.
  • the CAPTCHA generator may be configured to determine a phrase of words.
  • the CAPTCHA generator may further be configured to determine one or more spelling and/or grammatical errors to insert into respective words of the phrase.
  • the CAPTCHA generator may further be configured to generate a language CAPTCHA comprising the phrase of words including the determined one or more errors.
  • the one or more errors may be configured for human perception of the phrase of words based on the language CAPTCHA notwithstanding inclusion of the one or more errors in the language CAPTCHA.
  • the executable code instructions may cause the computer system to implement a human validator.
  • the human validator may be configured to receive user input data associated with the language CAPTCHA.
  • the human validator may be further configured to compare the user input data to the phrase of words.
  • the human validator may be further configured to determine whether the user input data was provided by a human based on said comparison.
  • a computer system configured to validate heteronym CAPTCHAs comprises one or more hardware processors programmed via executable code instructions. When executed, the executable code instructions may cause the computer system to implement a CAPTCHA generator.
  • the CAPTCHA generator may be configured to determine a phrase of words. The phrase of words when perceived together may comprise one or more meanings associated with the phrase of words that assist human perception of the phrase of words. The phrase of words may further comprise one or more heteronyms based on the one or more meanings associated with the phrase of words.
  • the CAPTCHA generator may further be configured to generate a heteronym CAPTCHA comprising the phrase of words including the one or more heteronyms.
  • the one or more heteronyms may be configured for human perception based on the one or more meanings associated with the phrase of words.
  • the executable code instructions may cause the computer system to implement a human validator.
  • the human validator may be configured to receive user input data associated with the heteronym CAPTCHA.
  • the human validator may be further configured to compare the user input data to two or more definitions corresponding to the one or more respective heteronyms.
  • the human validator may be further configured to determine whether the user input data was provided by a human based on said comparison.
  • a computer system configured to validate visual CAPTCHAs comprises one or more hardware processors programmed via executable code instructions.
  • the executable code instructions may cause the computer system to implement a CAPTCHA generator.
  • the CAPTCHA generator may be configured to generate a visual CAPTCHA comprising a visual pattern configured to be perceived as including a first object and/or action by a human user viewing the visual pattern. An automated computer system analyzing the visual pattern may not identify the first object and/or action.
  • the executable code instructions may cause the computer system to implement a human validator.
  • the human validator may be configured to receive user input data associated with the visual CAPTCHA.
  • the human validator may be further configured to compare the user input data to the first object and/or action.
  • the human validator may be further configured to determine whether the user input data was provided by a human based on said comparison.
  • FIG. 1 is a block diagram illustrating an example CAPTCHA system, according to some embodiments of the present disclosure.
  • FIG. 2A illustrates an example cognitive CAPTCHA, according to some embodiments of the present disclosure.
  • FIG. 2B illustrates a website comprising an example cognitive CAPTCHA, according to some embodiments of the present disclosure.
  • FIG. 2C illustrates an example cognitive CAPTCHA comprising a written heteronym, according to some embodiments of the present disclosure.
  • FIG. 3A illustrates an example cognitive CAPTCHA comprising a moiré pattern test, according to some embodiments of the present disclosure.
  • FIG. 3B illustrates an example cognitive CAPTCHA comprising a moiré pattern, according to some embodiments of the present disclosure.
  • FIG. 3C illustrates an example cognitive CAPTCHA comprising an alternative moiré pattern test, according to some embodiments of the present disclosure.
  • FIG. 3D illustrates example data comprising a moiré pattern of a cognitive CAPTCHA, according to some embodiments of the present disclosure.
  • FIG. 4A illustrates an example website comprising an example cognitive CAPTCHA comprising a moiré pattern, according to some embodiments of the present disclosure.
  • FIG. 4B illustrates an example website comprising an example cognitive CAPTCHA after some time has elapsed, according to some embodiments of the present disclosure.
  • FIG. 4C illustrates an example website comprising an example cognitive CAPTCHA comprising a moiré pattern after further user interaction, according to some embodiments of the present disclosure.
  • FIG. 5A illustrates an example cognitive CAPTCHA comprising a rorschach pattern, according to some embodiments of the present disclosure.
  • FIG. 5B illustrates an example cognitive reCAPTCHA comprising rorschach patterns, according to some embodiments of the present disclosure.
  • FIG. 5C illustrates an example cognitive CAPTCHA comprising a visual persistence pattern, according to some embodiments of the present disclosure.
  • FIG. 5D illustrates an example cognitive CAPTCHA comprising a visual persistence pattern after the elapse of some time, according to some embodiments of the present disclosure.
  • FIG. 6 is a block diagram illustrating an example CAPTCHA system with which various methods and systems discussed herein may be implemented.
  • CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart
  • CAPTCHA may be a mechanism whereby a computer issues a test to elicit an answer from an end user that enables the computer to determine whether the end user is a human.
  • a CAPTCHA may display text as a graphic, which may be partially obscured and/or distorted, and require the end user to respond with text characters.
  • a CAPTCHA may display known and unknown graphic words simultaneously. If the end user successfully identifies the known word, the end user's answer for the unknown word may be used by the CAPTCHA system to “solve” the unknown word.
  • the technique for solving for unknown tests through end user input will be referred to herein as “reCAPTCHA.”
  • CAPTCHA cognitive reCAPTCHA
  • cognitive CAPTCHA and/or “cognitive reCAPTCHA” will be used within the disclosure herein and further illustrated below to collectively refer to improved CAPTCHAs and reCAPTCHAs that exploit various human cognitive processes that computers cannot accurately imitate.
  • efficient, robust, scalable, and/or accurate test results may be achieved for distinguishing between humans and machines. While some examples herein refer to the English language, the systems and methods are applicable to humans that speak and/or understand other languages.
  • FIG. 1 illustrates a CAPTCHA system, according to some embodiments of the present disclosure.
  • the CAPTCHA environment 190 comprises a network 160 (including network 160 A and network 160 B), a CAPTCHA system 100 , a user computing device 102 , and a third party web server 110 . Various communications between these devices are illustrated.
  • the communication of a website request 112 , a CAPTCHA plugin 114 , a CAPTCHA request and/or data 116 , user interaction data 118 , and a validation request and/or response 120 are illustrated in various actions 1-5 that are illustrated in the circled numbers in FIG. 1 .
  • the CAPTCHA system 100 includes a CAPTCHA generator 104 , a CAPTCHA storage device 106 , and a human validator 108 , each of which is described in further detail below.
  • the website request 112 is transmitted from the user computing device 102 to the third party web server 110 through the network 160 .
  • the website requested may be any website for which the operator/owner has implemented a CAPTCHA mechanism.
  • the third party web server 110 may transmit the CAPTCHA plugin 114 to the user computing device 102 through the network 160 .
  • the CAPTCHA plugin 114 may be sent with website data, which may have been in response to the website request 112 .
  • the CAPTCHA plugin 114 may comprise source code instructions, data, and/or markup instructions, such as, but not limited to, JavaScript, XML, JSON, Hypertext Markup Language (“HTML”), and/or some combination thereof.
  • the CAPTCHA plugin 114 may be in a format such that web servers, similar to the third party web server 110 , may embed the CAPTCHA plugin 114 in their websites and/or web applications without major alterations and/or modifications to their existing architectures.
  • FIG. 2B illustrates an example cognitive CAPTCHA in a website.
  • the website view 250 may correspond to the display of the website data with the CAPTCHA plugin 114 by a web browser.
  • FIG. 2A illustrates an example cognitive CAPTCHA.
  • the loading and/or execution of the CAPTCHA plugin 114 of FIG. 1 by a web browser, application, and/or other device may result in the display of the cognitive CAPTCHA 200 of FIG. 2A .
  • the loading and/or execution of the CAPTCHA plugin 114 may cause the user computing device 102 to transmit the CAPTCHA request 116 .
  • data comprising the text 202 of FIG.
  • CAPTCHA system 100 “We holld thee-se tru7ths to be slef-evidantt, that all men are cre8ted evil, that they are endowned by there Crator with cretin unalienable Lefts, that among thease are Life, Library and the pursuit of Hapyness,” may be transmitted by the CAPTCHA system 100 and/or the CAPTCHA generator 104 in response to CAPTCHA request 116 of FIG. 1 (either directly from the CAPTCHA system 100 to the user computing divide 102 , or from the CAPTCHA system 100 to the user computing device 102 via the third party Web server 110 ).
  • the data comprising the text 202 of FIG. 2A may correspond to the CAPTCHA data 116 of FIG. 1 .
  • the CAPTCHA generator 104 may retrieve the CAPTCHA data 116 from the CAPTCHA storage device 106 .
  • the end user may interact with the CAPTCHA to transmit the user interaction data 118 to the third party web server through the network 160 .
  • the end user may interact with the cognitive CAPTCHA 200 of FIG. 2A .
  • the end user may interpret and/or read the text 202 .
  • the end user may then follow the instructions 204 to “[t]ype or speak the phrase with spelling and/or grammar corrections.”
  • the end user may type the phrase into the text box 206 and then click and/or press the submit button 210 , which may cause the transmission of the user interaction data 118 of FIG. 1 .
  • the cognitive CAPTCHA 200 may comprise a refresh button 212 , such that if an end user clicks and/or presses the refresh button, the text and/or content 202 refreshes and/or changes.
  • the end user may refresh the content of a cognitive CAPTCHA because the end user may find the content too difficult to interpret, read, understand, and/or solve. After several attempts, which may be configurable, the end user may be prohibited from refreshing the CAPTCHA to prevent against robots, computing devices, and/or machines from determining a correct answer to a cognitive CAPTCHA.
  • cognitive CAPTCHAs in this disclosure may be limited to English, the techniques, systems, methods, and devices disclosed herein may be applicable to humans that speak languages other than English because human cognitive processing remains similar across languages, cultures, and/or nationalities. Furthermore, some examples of this disclosure may refer to one or more “humans,” and it may be assumed that the human has limited to native proficiency with the English language. Although, as previously mentioned, cognitive CAPTCHAs may apply broadly to human cognitive abilities and is not limited to any language. Furthermore, the term “human” as used within this disclosure may refer to an animal, because the cognitive processing by a human and/or animal differs from machine and/or computer processing.
  • the content of a cognitive CAPTCHA may distinguish between a human and a machine because human processing, interpretation, and/or perception occurs differs from computer and/or machine data processing.
  • human processing, interpretation, and/or perception may successfully understand words where the first and/or last letters are in the correct place, regardless of the order of the other letters in a word.
  • Additional cues such as the presence of other words in a sentence, the context of a word and/or sentence, semantics of the phrase and/or sentence when perceived together and/or as a whole, meaning of the words and/or sentence when perceived together and/or as a whole, word length, and/or any other human perception factors may further ease human processing.
  • the meaning of a phrase and/or sentence may assist in successfully understanding the phrase and/or sentence by a human when there are errors because the meaning of the words of the phrase and/or sentence together, combined, and/or as a whole has additional meaning beyond the words individually.
  • the content of a cognitive CAPTCHA may comprise the sentence, wholly or partially: “Four sorce and sveen years ago our faethrs bruohgt frtoh on this cotninent, a new naiton, cncievoed in Lrebirty, and ddeitaced to the prpsooitoin that all men are ceraetd euqal.” Due to human cognitive processing, most humans may be able to read the correct spelling of the words standing alone from the preceding quoted sentence.
  • the content 202 of the cognitive CAPTCHA 200 illustrates other aspects of human cognitive processing that may distinguish humans from machines. Human processing may be able to compensate for additional, missing, and/or substituted letters or symbols.
  • content 202 may comprise the text: “We holld thee-se tru7ths to be slef-evidantt, that all men are cre8ted evil, that they are endowned by there Crator with cretin unalienable Lefts.” While the correct spelling may be “We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights,” similar to the human cognitive processing that was able to process words and/or sentences with misplaced letters, human cognitive processing may be able to correctly interpret the words and/or phrase from the content 202 .
  • the cognitive CAPTCHA and/or the CAPTCHA system may be deployed in a manner that reduces the effectiveness of systems and devices designed to distribute CAPTCHA problems to outsourced CAPTCHA solving centers. For example, an automated data scraping system may encounter a CAPTCHA, do a screen capture, send the CAPTCHA to the screen of a worker in a center located in Brazil, and resume data scraping after the human in Brazil has solved the CAPTCHA.
  • an automated data scraping system may encounter a CAPTCHA, do a screen capture, send the CAPTCHA to the screen of a worker in a center located in Brazil, and resume data scraping after the human in Brazil has solved the CAPTCHA.
  • automated mechanisms that incorporate distributed human CAPTCHA solving are rendered ineffective or less effective.
  • homonyms and/or homophones may be used for the content of a cognitive CAPTCHA.
  • the text content 202 includes the word “there” 230 , which is a homonym for the correct word “their” in that phrase's context.
  • the content may comprise the text, “he came at me with an acts,” and the CAPTCHA test may ask the end user to correctly spell the phrase and/or sentence.
  • Acts” and “axe” are homonyms. Therefore, a human end user may be able to determine the correct answer and/or replace “acts” with “axe” because the words sound similar, which may be difficult for a machine to determine.
  • the end user may be asked to identify the incorrect homonym and/or homophone within a phrase and/or sentence.
  • the text may comprise, “the pair tasted sweet going past his pallet,” where “pair” (instead of “pear”) and “pallet” (instead of “palate”) were incorrect, whereas “past,” which has the homophone “passed,” was correct).
  • Such distinctions may be difficult to identify programmatically, whereas human cognition may be able to identify the incorrect homonyms and/or homophones.
  • Certain techniques may be used to reduce human failures of cognitive CAPTCHAs, e.g., situations where humans fail a CAPTCHA test. For example, the greater the deviation from the correct presentation, the higher the likelihood that a human end user will unsuccessfully answer the CAPTCHA. Most humans may easily identify the term “Persident Obama,” “Persident Omaba” may be more difficult, and “Psdneiert Om baa” may be still more difficult. Finally, misplacing the first and last letters, such as, “Dnpretsei Aaomb,” may be too difficult for most humans to identify. Thus, to prevent human failures, certain structural and/or placements of letters should be avoided.
  • retaining sound groups and/or phonemes may prevent human failures. Keeping letters close to their correct positions in words may also be useful to prevent human failures.
  • additional letters and/or symbols should be similar to the correct letters and/or symbols, and additional letters and/or symbols should not introduce a substantial additional element such as an extra syllable. For example, “holld” may be correctly spelled by a human because the extra “l” may not add an extra syllable to the world.
  • “cr3ated” may be correctly interpreted by a human because the “3” resembles an “E” as interpreted and/or perceived by a human.
  • the difficulty of the phrase and/or word poses for human cognition may be manipulated by any one or a combination of these methods.
  • audio cognitive CAPTCHAs may be used to distinguish between humans and machines. Audio cognitive CAPTCHAs may be desirable in some cases, such as, but not limited to, compliance with the Americans with Disabilities Act. Some of the techniques, systems, and/or methods in this disclosure, such as, but not limited to, substitution of an incorrect and/or misspelled word into a phrase, may be implemented as an audio cognitive CAPTCHA.
  • An audio cognitive CAPTCHA and/or an audio component of a cognitive CAPTCHA may comprise a test where audio is played to an end user and the end user may type and/or speak the answer. For example, as illustrated in FIG. 2A , an end user may press and/or click the audio button 214 to be administered an audio test.
  • the audio test may comprise audio playback and/or a recording of the text content 202 or other words and/or phrases.
  • the end user may be asked to read and/or speak one or more words that may be a mispronunciation of a test word.
  • the cognitive CAPTCHA content may comprise the words “Phil Lying” (in text and/or audio) and the correct end user answer may be “filing” (where “Phil Lying” may be a mispronunciation of “filing”).
  • words with repeating adjacent sounds may together indicate a test word with the adjacent sounds reduced to a single sound, as in “Star Artling” corresponding to “startling” or “faux owning” corresponding to “phoning.”
  • startling corresponding to “startling” or “faux owning” corresponding to “phoning.”
  • end of the word “star” may be the same sound as beginning of the word “artling,” and a human may be able to answer the test word “startling” from hearing and/or reading “Star Artling.”
  • data for use in the CAPTCHA system may be gathered by harvesting, monitoring, or otherwise using corrections to computerized transcriptions of audio data.
  • a user of the “Siri” function on the iPhone may state “Do you need me to pick up Ben, Anna, and the baby on the way home?”
  • the audio to text service that converts the spoken words to text may transcribe it as “Do you need me to pick up banana and the baby on the way home?”
  • the user would then manually correct “banana” to “Ben, Anna.”
  • the data associated with the manual correction could be used as a source for a cognitive CAPTCHA, similar to the “Star Artling” example above.
  • the end user may be asked to read and/or speak one or more words (which may comprise a nonsensical phrase and/or sentence), but when read together sound like another word or phrase with an alternative reading.
  • the cognitive CAPTCHA content may comprise the words “easel aid ease man” and the correct answer may be “he's a lady's man” because the test content when read aloud and/or silently by a human end user may phonetically sound like and/or be similar to the test answer when interpreted by a human end user.
  • test content may be “know sayer” and the test answer may be “nose hair.”
  • a machine and/or computer even with a phonetic dictionary, may find it very difficult to find the associations between the unrelated words and/or phrases based on phonetic sounds.
  • one or more photographic and/or artistic images may be presented to aid the human in understanding the problem presented by the CAPTCHA.
  • a drawing with two dots at the top, an inverted triangle in the center of the middle and the bottom half of a circle at the bottom, with a slight line coming out of one part of the triangle may be enough to prevent a false negative and/or human failure of the cognitive CAPTCHA (by providing the human with a crude image of a face with an artifact near the nose).
  • cognitive CAPTCHAs may comprise heteronyms.
  • a heteronym is one of two or more words that have the same spellings but different meanings and pronunciations.
  • the end user may be asked to identify the incorrectly pronounced word or words. For example, an audio phrase may be “You polish the record,” where “polish” is pronounced as if referencing the country Tru, and/or “record” is pronounced as if referencing writing something down.
  • the audio phrase may be “please write about an interesting object,” where “object” is pronounced as if referencing somebody with an objection to a policy.
  • a human may be able to identify each of the incorrectly pronounced words, while a computer and/or machine would be unlikely to succeed at the same task.
  • FIG. 2C illustrates an example cognitive CAPTCHA comprising a written heteronym.
  • the cognitive CAPTCHA comprises text 250 , “[p]lease write about an interesting object.”
  • the end user must choose between definition A 252 , “to disagree with something or oppose something,” and definition B 254 , “a thing that you can see and touch.”
  • a human may select the correct choice, definition B 254 , from understanding the context of the sentence, but it may be difficult for a computer and/or machine to select definition B 254 .
  • the third party web server 110 may transmit a validation request 116 to the CAPTCHA system 100 and/or the human validator 108 through the network 160 .
  • the validation request 116 may comprise some or all of the user interaction data 118 .
  • the validation request 116 may comprise the answer and/or response from the end user based on the cognitive CAPTCHA test, a test identifier, the content of the cognitive CAPTCHA, such as the text content 202 of FIG. 2A , and/or an identifier for the content.
  • the human validator 108 may then load the correct answer from the CAPTCHA storage device 106 and compare it to the answer and/or response from the end user.
  • the human validator 108 may then send the validation response 116 to the third party web server 110 through the network 160 indicating whether the end user passed or failed the cognitive CAPTCHA test.
  • the third party web server 110 may then use the validation response 116 , e.g., to permission the end user for some activity and/or allow the end user to access some content.
  • the user interaction data 118 is sent directly to the CAPTCHA system 100 rather than via the third party web server 110 , in this embodiment, a validation response (e.g. confirming that the user provided the correct interaction data for the CAPTCHA) may be provided to the third party web server 110 after the human validator 108 of the CAPTCHA system processes the user interaction data 118 received directly from the user computing device 102 .
  • a machine and/or computer may able to automatically inspect, decompile, and/or analyze the JavaScript source code to determine the correct answer, and, therefore, could defeat the cognitive CAPTCHA.
  • moiré patterns may be used, alone or in combination with the techniques, methods, and/or systems disclosed herein, as cognitive CAPTCHAs.
  • a moiré pattern may be a visual pattern.
  • two identical patterns may be overlayed and/or superimposed to create a moiré pattern.
  • two patterns may be displaced and/or rotated a small amount from one another to create a moiré pattern.
  • cognitive CAPTCHAs with moiré patterns may allow the end user to control one or more characteristics and/or features of the grids, patterns, and/or interactions between the grids and/or patterns.
  • FIG. 3A illustrates an example cognitive CAPTCHA comprising a moiré pattern test.
  • the cognitive CAPTCHA 300 may comprise an instruction 330 , a first circle pattern 302 , a second circle pattern 304 , a pattern adjuster 305 , a submit button 310 , and a refresh button 312 .
  • the end user may be prompted with instruction 330 to “[a]djust the circles to make an eye.”
  • First circle pattern 302 may comprise twenty circles with the same origin, but with uniformly increasing radiuses.
  • Second circle pattern 304 may be identical or similar to first circle pattern 302 , but with a different vertical and/or horizontal coordinate for its origin.
  • Differences between the two circles may be implemented in other embodiments in order to cause the desired Moiré effect when the circles are properly overlapped. Additionally, any other shapes may be used in such a moiré-based CAPTCHA.
  • first circle pattern 302 and second circle pattern 304 there may initially be no overlap between first circle pattern 302 and second circle pattern 304 .
  • the end user may select, touch, and/or press the dial 306 of the pattern adjuster 305 (or drag-and-drop the circles themselves in one embodiment).
  • Dial 306 may be adjusted and/or its location may be moved as illustrated by arrow 307 , which may adjust the proximity and/or location of the first circle pattern 302 and/or the second circle pattern 304 .
  • FIG. 3B illustrates cognitive CAPTCHA 300 after end user interaction.
  • the ender user may have interacted with the pattern adjuster 305 , by adjusting and/or moving the dial 306 to a new position.
  • the proximity and/or location of the first circle pattern 302 and/or the second circle pattern 304 may have changed.
  • a moiré pattern may have been created from the overlap of first circle pattern 302 and second circle pattern 304 .
  • the overlap between first circle pattern 302 and the second circle pattern 304 may have created a visual pattern with a dark and/or solid oval center and/or a grid and/or dotted surrounding pattern.
  • the moiré pattern from the overlap of first circle pattern 302 and second circle pattern 304 may appear to be an “eye” as perceived and/or interpreted by a human.
  • a human end user may click and/or press the submit button 310 because the human end user perceived and/or interpreted the visual pattern to be an “eye.” If the end user selects positions of the first circle pattern 302 and the second circle pattern 304 within a specified range of overlap then the CAPTCHA system may authenticate and/or validate the end user as a human.
  • Example cognitive CAPTCHA 300 comprising a moiré pattern test may distinguish between human and machine end users for several reasons. The following reasons are illustrative and there may be additional reasons why the cognitive CAPTCHA 300 is successful. For example, it may difficult for a computer and/or machine to interpret and/or analyze a moiré pattern similar to how a human may interpret a moiré pattern through cognitive processing. It may be difficult to mathematically and/or programmatically correlate a moiré pattern to visual representations of objects and/or things, whereas such correlations may immediately occur to humans due to cognitive processing. Furthermore, it may be difficult to program and/or instruct a machine to interact with the user interface of a cognitive CAPTCHA comprising a moiré pattern test. For example, the pattern adjuster 305 of cognitive CAPTCHA 300 may be difficult to be interacted with by a machine and/or computer. Therefore, cognitive CAPTCHA 300 comprising a moiré pattern test may be successful at distinguishing between humans and machines.
  • the refresh button 312 of cognitive CAPTCHA 300 of FIG. 3A may change and/or alter content of the cognitive CAPTCHA. For example, by clicking and/or pressing the refresh button 312 , the visual patterns displayed and/or the instruction 330 may change and/or alter.
  • FIG. 3C illustrates an example cognitive CAPTCHA comprising an alternative moiré pattern test.
  • the instruction 330 of FIG. 3C may instruct the end user to “[a]djust the circles to make stripes” or “[a]djust the circles to make an asterisk-like shape in the overlapping area.”
  • the instruction 330 of FIG. 3A and FIG. 3C may have changed from an end user clicking and/or pressing the refresh button 312 of FIG. 3A .
  • the end user may adjust the pattern adjuster 305 .
  • a moiré pattern may have been created from the overlap of first circle pattern 302 and second circle pattern 304 of FIG. 3C .
  • the overlap between first circle pattern 302 and the second circle pattern 304 may have created a visual pattern, such as stripes as interpreted and/or viewed by a human end user.
  • Moiré patterns may not be limited to circle patterns.
  • moiré patterns may comprise boxes, rectangles, lines, and all variations of shapes, figures, and/or lines.
  • Moiré patterns may comprise variations of colors and not just black and/or white.
  • cognitivos there may be variations of the available user interactions with cognitive CAPTCHAs comprising moiré patterns.
  • the width of the lines, the number of lines, the speed and/or direction of rotation of the shapes and/or patterns, size of the shapes and/or patterns, relative position of the shapes and/or patterns, and/or colors of the lines, shapes, and/or patterns may all or in some combination thereof be modifiable by the end user to create moiré patterns.
  • alteration and/or modifications to the moiré patterns may be accomplished by moving, dragging, and/or dropping shapes and/or patterns through mouse input and/or touch input. For example, change of the relative position of first circle pattern 302 and second circle pattern 304 of cognitive CAPTCHA 300 in FIG.
  • 3A may occur by touch screen dragging and dropping of first circle pattern 302 and/or second circle pattern 304 .
  • alteration and/or change of the position of the shapes and/or patterns may not be limited to horizontal movement.
  • the height and/or Y position of one or more of the shapes and/or patterns may be altered and/or changed.
  • the cognitive CAPTCHA 300 of FIG. 3A may correspond to the CAPTCHA plugin 114 and/or the loading and/or execution of the CAPTCHA plugin 114 of FIG. 1 .
  • Moiré patterns of cognitive CAPTCHAs may be in various formats. Moiré patterns may comprise formats such as source code and/or code instructions, graphic files, vector image formats such as the scalable vector graphic (“SVG”) format, a database format, files, Extensible Markup Language (“XML”), JavaScript Object Notation (“JSON”), a file format that is proprietary to the CAPTCHA system, any other format and/or some combination thereof.
  • SVG scalable vector graphic
  • XML Extensible Markup Language
  • JSON JavaScript Object Notation
  • FIG. 3D illustrates example data comprising a moiré pattern of a cognitive CAPTCHA.
  • Moiré data 370 may correspond to the first circle pattern 302 and/or second circle pattern 304 of FIG. 3A .
  • Moiré data 370 illustrates an example XML and/or SVG format used to create the moiré patterns in FIGS. 3B and FIG. 3C .
  • the tags and/or elements of moiré data 370 are illustrative and, thus, may not be syntactically complete and/or correct.
  • the radius of the circle element with identity “circle1” may comprise a radius of “0.065”
  • the radius of the circle element with identity “circle2” may comprise a radius of “0.165”
  • the circle element with identity “circle20” may comprise a radius of “1.965.”
  • Moiré data 370 may correspond to one circle pattern and may be duplicated and/or repeated to correspond to one or more additional circle patterns.
  • the pattern data may be combined with other techniques and/or methods to create a cognitive CAPTCHA and/or moiré pattern.
  • moiré data 370 may be transformed and/or translated by changing the coordinates of the origin and/or the X and/or Y coordinates.
  • Pattern data, such as example moiré data 370 may be combined with source code and/or code instructions to manipulate and/or transform the pattern and/or shape data.
  • the pattern data, following end user interaction, may be transmitted along with other data to validate and/or authenticate a human end user.
  • a series of static images may be presented to the end user to determine image selection based on moiré qualities.
  • the various images of the circle patterns from FIGS. 3A , 3 B, and/or 3 C may be displayed to the end user and the end user may be asked to identify the image corresponding to an “eye” or “stripes.”
  • formulas may be used to represent and/or characterize moiré patterns.
  • a shape moiré and/or band moiré may comprise a revealing layer comprising black lines with transparent lines and a base layer comprising periodically repeating shapes.
  • the repeating pattern in the base layer is stretched and/or runs along the vertical axis.
  • the shapes and/or patterns that are created are magnified versions of the repeating pattern.
  • a band moiré pattern may be represented by the following formula:
  • P b may denote and/or indicate the period of shapes in the base layer.
  • P r may denote and/or indicate the period of transparent lines in the revealing layer.
  • P m may denote and/or indicate the size of the optical shapes magnified along the vertical axis and/or the period of the moiré shapes and/or lines.
  • both the base layer and the revealing layer may comprise repeating parallel lines.
  • the period of the base layer, P b i.e., the space between the parallel lines, may be thirteen.
  • the period of the revealing layer, P r may be twelve.
  • the period of moiré lines, P m may be one hundred and fifty six.
  • various moiré patterns may be generated by altering the input numbers P b and P r .
  • CAPTCHA similar to any computation and/or validation that may be desirable to occur in the CAPTCHA system, it may be desirable for some or all of the code instructions that may transform the content of a cognitive CAPTCHA to occur in the CAPTCHA system.
  • some of the user interaction data may be transmitted to the CAPTCHA system and the CAPTCHA system may stream the content, such as the image and/or audio, to the end user computing device.
  • cognitivities there may be some variations of cognitive CAPTCHAs comprising moiré patterns to prevent scaling. Moiré patterns and/or effects may be affected and/or impacted by changes to device screen resolutions and/or upscaling or downsizing of images.
  • code instructions may be used to prevent rescaling. For example, there may be HTML markup instructions instructing the web browser and/or viewing device not to scale.
  • the end user may be informed that scaling may prevent a proper cognitive CAPTCHA test.
  • the cognitive CAPTCHA may determine the available space in the end user's screen and/or display and generates a pattern that does not require scaling.
  • the CAPTCHA system may alter the pattern data and/or pattern based on the end user computing device and/or may validate and/or authorize the end user based on end user computing device's particular configuration and/or settings. For example, display type and size may be determined through HTTP headers, local variables, and/or other methods.
  • FIG. 4A illustrates an example cognitive CAPTCHA implementation.
  • the cognitive CAPTCHA 400 may comprise an instruction 410 , a first circle pattern 402 , a second circle pattern 404 , and a pattern adjuster 405 .
  • the components of CAPTCHA 400 may comprise similar functionality to the components of cognitive CAPTCHA 300 of FIG. 3A .
  • the pattern adjuster 405 may adjust the relative positions of the first circle pattern 402 and/or the second circle pattern 404 .
  • An end user upon visiting the example website 450 through a web browser may interpret and/or read the instruction 410 to “[m]aintain an eye, otherwise you will be logged out in 60 seconds.”
  • the cognitive CAPTCHA 400 may remain visible throughout a session at the website 450 and/or be brought back to visibility at some point within a session. As time passes and/or in response to other events, the settings of the cognitive CAPTCHA 400 may be altered and/or appear to drift from the end user's selected settings. For example, as illustrated by FIG. 4B , the cognitive CAPTCHA 400 may have altered and/or changed after the elapse of time.
  • first circle pattern 402 and/or a second circle pattern 404 may have drifted to their respective current positions of no overlap as illustrated by FIG. 4B .
  • instruction 410 may have changed to comprise the text of “59 seconds remaining to make an eye . . . ” to indicate to the end user that a logout will occur if further user interaction is not taken.
  • FIG. 4C may illustrate the cognitive CAPTCHA 400 after further end user interaction.
  • the end user may have interacted with the pattern adjuster 405 to adjust the relative positions of the first circle pattern 402 and/or the second circle pattern 403 to within a range and/or threshold to validate and/or authenticate a human end user.
  • cognitive CAPTCHA 400 may fade in and/or out. For example, once the cognitive CAPTCHA 400 is reset, the CAPTCHA 400 may fade out because user interaction is not necessary. However, as the logout period gets closer, the cognitive CAPTCHA 400 may fade in, become more prominent, bolder, and/or highlighted to indicate to the end user that further interaction may be necessary.
  • the patterns and/or tests of the cognitive CAPTCHA 400 may change over time.
  • the instruction 410 may change from requiring making an “eye” to “stripes.”
  • the patterns themselves may change from circles to squares and/or other shapes over time.
  • FIG. 4 There may be several advantages to persistent cognitive CAPTCHAs as illustrated by FIG. 4 .
  • authentication and/or reauthentication mechanisms may often annoy end users because such mechanisms completely interrupt the end user's session and/or experience.
  • a user may adjust the settings as needed during breaks of website activity and/or other periods when it is less intrusive.
  • the use of persistent and/or drifting cognitive CAPTCHAs is not limited to moiré patterns as shown in FIG. 4 , but rather may be used with any other CAPTCHAs and/or systems, methods, and/or techniques disclosed herein.
  • Additional advantages of persistent cognitive CAPTCHAs may include thwarting outsourcing of CAPTCHA “solving.” For example, teams of human end users, such as hundreds or thousands of people, may be employed to solve and/or complete CAPTCHAs to provide the answers to automated computer systems to bypass human validation systems in the future.
  • systems and/or websites employ persistent CAPTCHAs, it may be very difficult or impossible to design computer systems to continuously interact with persistent cognitive CAPTCHAs.
  • persistent cognitive CAPTCHAs may further promote distinguishing between humans and machines and discourage the outsourcing of solving CAPTCHAs.
  • cognitive CAPTCHAs may comprise various visual patterns. Another aspect of the difference between human perception and interpretation by computers is that human cognitive processing may easily identify and/or infer patterns within objects and/or images. For example, a human looking at clouds in the sky or pictures of clouds may see an elephant, a car, or a person. On the other hand, a computer presented with a variety of photographs of clouds would find it difficult to identify which of the clouds a human would perceive as an object, such as an elephant. Another example of finding representations of objects within an unrelated image may include inkblot and/or rorschach patterns.
  • FIG. 5A illustrates an example cognitive CAPTCHA comprising a rorschach pattern.
  • the user interface of cognitive CAPTCHA 500 may comprise a submit button 510 , and a refresh button 512 , an audio button 514 , a microphone 508 , and a text box 506 , which may behave similarly to the user interface of cognitive CAPTCHA 200 of FIG. 2 .
  • Cognitive CAPTCHA 500 may comprise pattern 502 that may be a digital inkblot and/or rorschach pattern. A feature of pattern 502 may be that the pattern is symmetrical. Pattern 502 may have been automatically and/or randomly generated by a system such as the CAPTCHA system.
  • Instructions 504 may prompt the end user to type and/or respond with an object and/or idea that the human end user associates with the pattern 502 .
  • human end users may perceive, interpret, and/or see a “person” by looking at pattern 502 because the inkblot appears to have a head, body, arms, and/or legs, which comprise a human and/or person drawing.
  • Cognitive CAPTCHAs may comprise audio and/or recordings that elicit unrelated identifications and/or pattern recognitions. For example, if the end user presses and or clicks the audio button 514 , the end user may be played randomly generated audio noises and/or sounds to elicit identification with objects and/or things, such as an association with the “ocean” because a human end user may interpret the sounds as sounds of the ocean.
  • FIG. 5B illustrates an example cognitive reCAPTCHA comprising rorschach patterns.
  • Cognitive reCAPTCHA 520 may comprise pattern 502 and pattern 530 .
  • pattern 502 may be a known and/or solved pattern where the correct human validation answer is “person.”
  • the pattern 530 (which may have been randomly and/or automatically generated by the CAPTCHA system) may be an unknown and/or unsolved. In other words, there may be no known association with what the pattern 530 looks like when perceived by humans. For example, humans may interpret and/or perceive pattern 530 as a hat with eye and/or a car.
  • the CAPTCHA may store and/or use the second answer to the pattern 530 (such as “hat” or “car”).
  • the CAPTCHA system may collect answers to unknown visual, audio, and/or other types of patterns, which may be randomly and/or automatically generated.
  • the first answer to a validated unknown pattern will be saved and/or stored as the answer to that pattern.
  • an unknown pattern will be “solved” when the number of answers for that unknown pattern surpasses a given and/or configurable threshold.
  • cognitive CAPTCHAs comprising visual representations may be asymmetric, such as, but not limited to, images and/or representations of clouds.
  • cognitive CAPTCHAs may comprise visual and/or audio vibrations.
  • visual vibrations a result of the biological properties of the human eye and/or human brain is that humans may perceive an image as changing and/or moving when the image may be vibrating. For example, a three dimensional image may be generated from vibrating and/or oscillating the image. It may be difficult to program code instructions of a computer and/or machine to mimic human perception to recognize patterns and/or movements from visual vibrations.
  • interference between sound waves and/or filtering of sound waves may also be used in cognitive CAPTCHAs.
  • a voice and/or other signal may be embedded within a sound that contains other, masking sounds.
  • a human voice recording may be isolated at a frequency and/or frequency range (such as using an auto-tuner) and masking sounds may be kept out of that frequency range in whole or in part.
  • a human voice recording may be auto-tuned to two kilohertz and/or masking noises introduced at higher volumes and/or frequencies at other portions of the range, but at a volume and/or frequency over which a human voice can be heard at two kilohertz.
  • the end user would then be prompted to use an equalizer function to reduce and/or eliminate noises at other ranges, which may move and/or shift the range until the end users identifies the voice.
  • the end user may be asked to identify the end users' own voice in a range of voices and/or noise recordings.
  • the phenomenon of human visual persistence may be used to create or enhance CAPTCHAs.
  • a CAPTCHA could be presented in an output window, such as, but not limited to, a command line window.
  • a program may generate a random or semi-random stream of character lines (for example, ten or forty character lines).
  • FIG. 5C illustrates an example cognitive CAPTCHA comprising a visual persistence pattern.
  • Cognitive CAPTCHA 550 comprises an output window 562 with text output 564 .
  • the text output 564 may be random and/or semi-random.
  • FIG. 5D illustrates the text output 564 after the elapse of time.
  • the cognitive CAPTCHA 550 may stream new lines of characters to create the visual pattern of waves as perceived by a human end user. For example, the lines of text may scroll up the screen as new lines of text are added at the bottom (or scrolling in the opposite direction in some embodiments) to illustrate some object or movement that isn't obvious in a single snapshot of the output window 562 .
  • the correct answer to cognitive CAPTCHA 550 may be “waves” and/or “waving.” It may be difficult for a machine to recognize such a pattern.
  • the end user may be provided several multiple choice answers to select from.
  • a cognitive CAPTCHA with an output window may rearrange the lines by swapping one or more characters in a manner that creates a pattern as multiple lines scroll past. In one aspect, this could be done by having the character “l” or the number one (“1”) or the exclamation point (which are all similar in that they are vertical lines) move between positions as the lines go past, following a pattern such as “move to the right, wait a short time, move to the right twice more with an even shorter delay, then slowly move back left.” For example, the pattern of “move to the right, wait a short time, move to the right twice more with an even shorter delay, then slowly move back left,” may be one of several multiple choice answers for the end user to select from.
  • a human may identify the pattern (e.g., the movement of a particular character or group of characters), whereas a machine would have difficulty doing so. Such difficulty may be increased if different characters are used, such as, but not limited to, a blank space, characters with primarily horizontal lines, characters with two vertical lines, etc. In some embodiments, the character need not be present on every line, so the composition of the line characters in the aggregate can be random, although the rearrangement would not be.
  • visual persistence may be used to create patterns in flowing artwork and/or graphics. For example, many music “visualizers” create graphical patterns that move in conjunction with changes to ambient sound. Such changes, with or without the sound, present patterns easily noticed by a human but far more difficult to identify for a computer.
  • the end user may be asked to speak in a certain pattern to create a specified effect in a visualize as part of a CAPTCHA (e.g., “make the visualizer bump in a manner similar to the beat of the chorus of Queen's ‘We Will Rock You’”).
  • cognitive CAPTCHAs may comprise animations and/or request the end user to identify actions and/or verbs (e.g., rather than the actual objects in the images). For example, using the output window and/or command line techniques illustrated above, the cognitive CAPTCHA may display a text-based stick figure walking and/or a horse galloping. Thus, the correct answer to the example cognitive CAPTCHA may be an action word and/or verb, such as, but not limited to, “walking,” “running,” “galloping,” etc.
  • the cognitive CAPTCHAs may comprise animation formats and/or techniques, such as, but not limited to, Graphic Interchange Format (“GIF”), Flash, SVG, XML, JavaScript, AJAX, and/or some combination thereof.
  • GIF Graphic Interchange Format
  • Cognitive CAPTCHAs comprising animations and/or verb tests may be combined, in part or whole, with other methods, systems, and/or techniques described in this disclosure.
  • patterns may be generated through printed patterns, patterns on digital methods, and/or other methods of displaying content other than through computing systems.
  • content may be encrypted through the systems, methods, devices, and/or techniques disclosed herein.
  • the systems, methods, devices, and/or techniques disclosed herein related to cognitive CAPTCHAs may be used as passwords and/or components of passwords.
  • an end user may adjust a moiré pattern to a certain level and/or threshold, such as the moiré patterns illustrated in FIG. 3B and/ FIG. 3C , to validate and/or authorize the end user.
  • the circle moiré patterns may visually recognize the look and/or feel of a combination lock.
  • the delivery and/or transmission of the CAPTCHA may be varied to verify and/or validate a human end user.
  • the systems, methods, devices, and/or techniques disclosed in the Location reference may be used with CAPTCHAs.
  • a CAPTCHA may be sent by text message and/or email to an end user's mobile device according to the systems, methods, devices, and/or techniques disclosed in the Location reference and/or otherwise.
  • the CAPTCHA may be sent only to a particular network, which may frustrate the outsourcing of CAPTCHA breakers to teams of humans who may be located outside of the particular network.
  • the CAPTCHA may only accept answers sent from a particular location and/or locale, which may also prevent the outsourcing situation.
  • cognitive CAPTCHAs may be prohibited from being displayed on mobile devices and/or particular mobile devices to guarantee proper display of the cognitive CAPTCHA.
  • the systems, methods, devices, and/or techniques disclosed herein may be used for search engine capture management.
  • a persistent problem for web publishers such as, but not limited to, Twitter posters, blog writers and/or bloggers, and/or article publishers, is that web publishers may be unable to manage how search engines, web crawlers, and/or other web services digitally us and read their content.
  • web publishers may be unable to manage how search engines, web crawlers, and/or other web services digitally us and read their content.
  • an article regarding breast cancer is published and/or posted to the Internet, the article may be indexed by a search engine and/or returned by search engines for searches of pornography.
  • pornographic advertisements may appear in proximity to the article when displayed in search results.
  • search engines and/or other web services may simply ignore the robots.txt file.
  • search engines and/or other web services may simply ignore the robots.txt file.
  • the content that search engines and/or other web crawlers index may be managed and/or limited.
  • the text article provided to the search engine and/or other web crawler may contain the misspelled word “breats,” which may be properly interpreted by human end users but may not be indexed by automated search engines and/or other web crawlers.
  • the type of alteration may be based on at least in part on the entity, device, service, and/or Internet Protocol address requesting the data.
  • the Google search engine may receive the altered data and/or text while a medical search engine may receive the unaltered data and/or text.
  • an image may be altered based on the requesting service. Similar to the altered text data, a blacked out and/or censored image of a breast may be sent to the search engine but the correct image may be sent to the medical search engine.
  • the systems, methods, devices, and/or techniques regarding cognitive language processing disclosed herein may be used for digital watermarking.
  • misspellings and/or substitutions of letters and/or symbols may be introduced to digital documents as a form of a digital signature and/or unique identifier.
  • the intentional introduction of errors such as “1” (the number one) in place of the letter “l”, may be used to uniquely identify a document that is copied.
  • Additional changes may be made, such as adding spaces, changing single quotes to double quotes, changing a short dash to a long dash, changing semi-colons to colons or periods, substituting abbreviations or contractions for their longer counterparts, changing capitalization of words, changing spelling of words amenable to multiple spellings or regionally different spellings (i.e. color vs. colour), substitution of synonyms, substitution of a negating word and an antonym, the reverse of all of the foregoing, and/or any other changes.
  • data may be placed into a document that is not apparent to a human end user.
  • the types of changes that may be made do not trigger a spell check flag and/or alert and/or an automatic correction by optical character reading software and/or word processing software.
  • additional changes may be made to the document unrelated to the one or more unique identifiers such that a plurality of copies of the document cannot be easily compared in order to identify the digital watermark.
  • digital watermarks may be embedded in a document and/or stored in a database to indicate one or more end users and/or persons that have been given permissions to access the document. For example, if a scientific article hosted on a web page and/or website was tracked according to one or more of these mechanisms, the identity of the subscriber, the IP address used for access, and/or other information may be entered into a database together with an entry indicating the watermarking done to the document associated with that information.
  • the various computing device(s) discussed herein are generally controlled and coordinated by operating system software, such as, but not limited to, iOS, Android, Chrome OS, Windows XP, Windows Vista, Windows 7, Windows 8, Windows Server, Windows CE, Unix, Linux, SunOS, Solaris, Macintosh OS X, VxWorks, or other compatible operating systems.
  • operating system software such as, but not limited to, iOS, Android, Chrome OS, Windows XP, Windows Vista, Windows 7, Windows 8, Windows Server, Windows CE, Unix, Linux, SunOS, Solaris, Macintosh OS X, VxWorks, or other compatible operating systems.
  • the computing devices may be controlled by a proprietary operating system.
  • Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file system, networking, I/O services, and provide a user interface functionality, such as a graphical user interface (“GUI”), among other things.
  • GUI graphical user interface
  • the CAPTCHA system 100 may be hosted and/or executed on one or more computing devices with one or more
  • FIG. 6 is a block diagram that illustrates example components of the CAPTCHA system 100 . While FIG. 6 refers to the CAPTCHA system 100 , any of the other computing devices discussed herein may have some or all of the same or similar components.
  • the CAPTCHA system 100 may execute software, e.g., standalone software applications, applications within browsers, network applications, etc., whether by the particular application, the operating system, or otherwise. Any of the systems discussed herein may be performed by the CAPTCHA system 100 and/or a similar computing system having some or all of the components discussed with reference to FIG. 5 .
  • the CAPTCHA system 100 includes a bus 602 or other communication mechanism for communicating information, and a hardware processor, or multiple processors, 604 coupled with bus 602 for processing information.
  • Hardware processor(s) 604 may be, for example, one or more general purpose microprocessors.
  • the CAPTCHA system 100 also includes a main memory 606 , such as a random access memory (RAM), cache and/or other dynamic storage devices, coupled to bus 602 for storing information and instructions to be executed by processor(s) 604 .
  • Main memory 606 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor(s) 604 .
  • Such instructions when stored in storage media accessible to processor(s) 604 , render the CAPTCHA system 100 into a special-purpose machine that is customized to perform the operations specified in the instructions.
  • Such instructions, as executed by hardware processors may implement the methods and systems described herein for sharing security information.
  • the CAPTCHA system 100 further includes a read only memory (ROM) 608 or other static storage device coupled to bus 602 for storing static information and instructions for processor(s) 604 .
  • ROM read only memory
  • a storage device 610 such as a magnetic disk, optical disk, or USB thumb drive (Flash drive), etc., is provided and coupled to bus 602 for storing information and instructions.
  • the CAPTCHA storage device 106 FIG. 1 may be stored on the main memory 606 and/or the storage device 610 .
  • the CAPTCHA storage device 106 of FIG. 1 is a file system, relational database such as, but not limited to, MySql, Oracle, Sybase, or DB2, and/or a distributed in memory caching system such as, but not limited to, Memcache, Memcached, or Java Caching System.
  • the CAPTCHA system 100 may be coupled via bus 602 to a display 612 , such as a cathode ray tube (CRT) or LCD display or touch screen, for displaying information to a computer user.
  • a display 612 such as a cathode ray tube (CRT) or LCD display or touch screen
  • An input device 614 is coupled to bus 602 for communicating information and command selections to processor 604 .
  • One type of input device 614 is a keyboard including alphanumeric and other keys.
  • Another type of input device 614 is a touch screen.
  • cursor control 616 such as a mouse, a trackball, a touch screen, or cursor direction keys for communicating direction information and command selections to processor 604 and for controlling cursor movement on display 612 .
  • This input device may have two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
  • a first axis e.g., x
  • a second axis e.g., y
  • the same direction information and command selections as cursor control may be implemented via receiving touches on a touch screen without a cursor.
  • the CAPTCHA system 100 may include a user interface unit to implement a GUI, for example, FIGS. 2 , 3 , 4 , and/or 5 , which may be stored in a mass storage device as executable software codes that are executed by the computing device(s).
  • This and other units may include, by way of example, components, such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables.
  • the CAPTCHA system 100 and/or the CAPTCHA plugin 114 of FIG. 1 may be configured to be compatible with web browsers such as, but not limited to, Firefox, Internet Explorer, Safari, and/or Chrome.
  • instructions refers to logic embodied in hardware or firmware, or to a collection of software units, possibly having entry and exit points, written in a programming language, such as, but not limited to, Java, Lua, C, C++, or C#.
  • a software unit may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, but not limited to, BASIC, Perl, or Python.
  • Certain web programming methods may be used such as AJAX. It will be appreciated that software units may be callable from other units or from themselves, and/or may be invoked in response to detected events or interrupts.
  • Software units configured for execution on computing devices by their hardware processor(s) may be provided on a computer readable medium, such as a compact disc, digital video disc, flash drive, magnetic disc, or any other tangible medium, or as a digital download (and may be originally stored in a compressed or installable format that requires installation, decompression or decryption prior to execution).
  • a computer readable medium such as a compact disc, digital video disc, flash drive, magnetic disc, or any other tangible medium, or as a digital download (and may be originally stored in a compressed or installable format that requires installation, decompression or decryption prior to execution).
  • Such software code may be stored, partially or fully, on a memory device of the executing computing device, for execution by the computing device.
  • Software instructions may be embedded in firmware, such as an EPROM.
  • hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors.
  • the instructions described herein
  • the CAPTCHA system 100 may be programmed, via executable code instructions, in a programming language.
  • non-transitory media refers to any media that store data and/or instructions that cause a machine to operate in a specific fashion. Such non-transitory media may comprise non-volatile media and/or volatile media.
  • Non-volatile media includes, for example, optical or magnetic disks, such as storage device 610 .
  • Volatile media includes dynamic memory, such as main memory 606 .
  • non-transitory media include, for example, a floppy disk, a flexible disk, hard disk, solid state drive, magnetic tape, or any other magnetic data storage medium, a CD-ROM, any other optical data storage medium, any physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge, and networked versions of the same.
  • Non-transitory media is distinct from but may be used in conjunction with transmission media.
  • Transmission media participates in transferring information between nontransitory media.
  • transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 602 .
  • transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
  • Various forms of media may be involved in carrying one or more sequences of one or more instructions to processor(s) 604 for execution.
  • the instructions may initially be carried on a magnetic disk or solid state drive of a remote computer.
  • the remote computer may load the instructions into its dynamic memory and send the instructions over a telephone or cable line using a modem.
  • a modem local to the CAPTCHA system 100 may receive the data on the telephone or cable line and use an infra-red transmitter to convert the data to an infra-red signal.
  • An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 602 .
  • Bus 602 carries the data to main memory 606 , from which the processor(s) 604 retrieves and executes the instructions.
  • the instructions received by main memory 606 may retrieve and execute the instructions.
  • the instructions received by main memory 606 may optionally be stored on storage device 610 either before or after execution by processor(s) 604 .
  • the CAPTCHA system 100 also includes a communication interface 618 coupled to bus 602 .
  • Communication interface 618 provides a two-way data communication coupling to a network link 620 that is connected to a local network 622 .
  • communication interface 618 may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line.
  • ISDN integrated services digital network
  • communication interface 618 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN (or WAN component to be communicated with a WAN).
  • LAN local area network
  • Wireless links may also be implemented.
  • communication interface 618 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
  • Network link 620 typically provides data communication through one or more networks to other data devices.
  • network link 620 may provide a connection through local network 622 to a host computer 624 or to data equipment operated by an Internet Service Provider (ISP) 626 .
  • ISP 626 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the “Internet” 628 .
  • Internet 628 uses electrical, electromagnetic or optical signals that carry digital data streams.
  • the signals through the various networks and the signals on network link 620 and through communication interface 618 which carry the digital data to and from the CAPTCHA system 100 , are example forms of transmission media.
  • a network such as the network 160 of FIG. 1 , may comprise, but is not limited to, one or more local area networks, wide area network, wireless local area network, wireless wide area network, the Internet, or any combination thereof.
  • the Hypertext Transfer Protocol (“HTTP”) may be used for communication through the network 160 , which may correspond to the Internet and/or any combination of networks.
  • HTTP Hypertext Transfer Protocol
  • the website request 112 , CAPTCHA plugin 114 , CAPTCHA request and/or data 116 , user interaction data 118 , and/or a validation request and/or response 120 of FIG. 1 may be sent through the network 160 through HTTP requests and/or responses.
  • the CAPTCHA environment 190 may not comprise a third party web server 110 of FIG. 1 .
  • the user computing device 102 of FIG. 1 may communicate with the CAPTCHA system 110 without the third party web server 110 as an intermediary.
  • the CAPTCHA system may be used without the use of the Internet.
  • the CAPTCHA system may communicate directly with the user computing device 102 without the use of the Internet.
  • the request 112 may not be a website request but rather a CAPTCHA plugin request.
  • the CAPTCHA system 100 can send messages and receive data, including program code, through the network(s), network link 620 and communication interface 618 .
  • a server 630 might transmit a requested code for an application program through Internet 628 , ISP 626 , local network 622 and communication interface 618 .
  • the received code may be executed by processor(s) 604 as it is received, and/or stored in storage device 510 , or other non-volatile storage for later execution.
  • Conditional language such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing. Persistent plugins and tests may be used to continuously verify human users.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
Any and all applications for which a foreign or domestic priority claim is identified in the Application Data Sheet as filed with the present application are hereby incorporated by reference under 37 CFR 1.57.
This application is a continuation of U.S. patent application Ser. No. 14/147,253 filed Jan. 3, 2014, which claims benefit of U.S. Provisional Patent Application Ser. No. 61/749,185 filed Jan. 4, 2013. Each of these applications are hereby incorporated by reference herein in their entireties.
This application is related to but does not claim priority from U.S. Pat. No. 6,895,236 entitled “Method for Verifying Geographical Location of Wide Area Network Users” filed Aug. 23, 2001, which is hereby incorporated by reference in its entirety and referred to herein as the “Location reference.”
BACKGROUND
In the area of computer-based platforms, reverse Turing tests may be used to tell humans and computers apart.
SUMMARY
The systems, methods, techniques, and devices described herein each have several aspects, no single one of which is solely responsible for its desirable attributes. Without limiting the scope of this disclosure, several non-limiting features will now be discussed briefly.
In some embodiments, a computer system configured to validate language CAPTCHAs comprises one or more hardware processors programmed via executable code instructions. When executed, the executable code instructions may cause the computer system to implement a CAPTCHA generator. The CAPTCHA generator may be configured to determine a phrase of words. The CAPTCHA generator may further be configured to determine one or more spelling and/or grammatical errors to insert into respective words of the phrase. The CAPTCHA generator may further be configured to generate a language CAPTCHA comprising the phrase of words including the determined one or more errors. The one or more errors may be configured for human perception of the phrase of words based on the language CAPTCHA notwithstanding inclusion of the one or more errors in the language CAPTCHA. When further executed, the executable code instructions may cause the computer system to implement a human validator. The human validator may be configured to receive user input data associated with the language CAPTCHA. The human validator may be further configured to compare the user input data to the phrase of words. The human validator may be further configured to determine whether the user input data was provided by a human based on said comparison.
In some embodiments, a computer system configured to validate heteronym CAPTCHAs comprises one or more hardware processors programmed via executable code instructions. When executed, the executable code instructions may cause the computer system to implement a CAPTCHA generator. The CAPTCHA generator may be configured to determine a phrase of words. The phrase of words when perceived together may comprise one or more meanings associated with the phrase of words that assist human perception of the phrase of words. The phrase of words may further comprise one or more heteronyms based on the one or more meanings associated with the phrase of words. The CAPTCHA generator may further be configured to generate a heteronym CAPTCHA comprising the phrase of words including the one or more heteronyms. The one or more heteronyms may be configured for human perception based on the one or more meanings associated with the phrase of words. When further executed, the executable code instructions may cause the computer system to implement a human validator. The human validator may be configured to receive user input data associated with the heteronym CAPTCHA. The human validator may be further configured to compare the user input data to two or more definitions corresponding to the one or more respective heteronyms. The human validator may be further configured to determine whether the user input data was provided by a human based on said comparison.
In some embodiments, a computer system configured to validate visual CAPTCHAs comprises one or more hardware processors programmed via executable code instructions. When executed, the executable code instructions may cause the computer system to implement a CAPTCHA generator. The CAPTCHA generator may be configured to generate a visual CAPTCHA comprising a visual pattern configured to be perceived as including a first object and/or action by a human user viewing the visual pattern. An automated computer system analyzing the visual pattern may not identify the first object and/or action. When further executed, the executable code instructions may cause the computer system to implement a human validator. The human validator may be configured to receive user input data associated with the visual CAPTCHA. The human validator may be further configured to compare the user input data to the first object and/or action. The human validator may be further configured to determine whether the user input data was provided by a human based on said comparison.
BRIEF DESCRIPTION OF THE DRAWINGS
Certain aspects of the disclosure will become more readily appreciated as those aspects become better understood by reference to the following detailed description, when taken in conjunction with the accompanying drawings.
FIG. 1 is a block diagram illustrating an example CAPTCHA system, according to some embodiments of the present disclosure.
FIG. 2A illustrates an example cognitive CAPTCHA, according to some embodiments of the present disclosure.
FIG. 2B illustrates a website comprising an example cognitive CAPTCHA, according to some embodiments of the present disclosure.
FIG. 2C illustrates an example cognitive CAPTCHA comprising a written heteronym, according to some embodiments of the present disclosure.
FIG. 3A illustrates an example cognitive CAPTCHA comprising a moiré pattern test, according to some embodiments of the present disclosure.
FIG. 3B illustrates an example cognitive CAPTCHA comprising a moiré pattern, according to some embodiments of the present disclosure.
FIG. 3C illustrates an example cognitive CAPTCHA comprising an alternative moiré pattern test, according to some embodiments of the present disclosure.
FIG. 3D illustrates example data comprising a moiré pattern of a cognitive CAPTCHA, according to some embodiments of the present disclosure.
FIG. 4A illustrates an example website comprising an example cognitive CAPTCHA comprising a moiré pattern, according to some embodiments of the present disclosure.
FIG. 4B illustrates an example website comprising an example cognitive CAPTCHA after some time has elapsed, according to some embodiments of the present disclosure.
FIG. 4C illustrates an example website comprising an example cognitive CAPTCHA comprising a moiré pattern after further user interaction, according to some embodiments of the present disclosure.
FIG. 5A illustrates an example cognitive CAPTCHA comprising a rorschach pattern, according to some embodiments of the present disclosure.
FIG. 5B illustrates an example cognitive reCAPTCHA comprising rorschach patterns, according to some embodiments of the present disclosure.
FIG. 5C illustrates an example cognitive CAPTCHA comprising a visual persistence pattern, according to some embodiments of the present disclosure.
FIG. 5D illustrates an example cognitive CAPTCHA comprising a visual persistence pattern after the elapse of some time, according to some embodiments of the present disclosure.
FIG. 6 is a block diagram illustrating an example CAPTCHA system with which various methods and systems discussed herein may be implemented.
DETAILED DESCRIPTION
Reverse Turing tests may be used to tell humans and computers apart. A type of reverse Turing test is the Completely Automated Public Turing test to tell Computers and Humans Apart (“CAPTCHA”). CAPTCHA may be a mechanism whereby a computer issues a test to elicit an answer from an end user that enables the computer to determine whether the end user is a human. For example, a CAPTCHA may display text as a graphic, which may be partially obscured and/or distorted, and require the end user to respond with text characters. In another example, a CAPTCHA may display known and unknown graphic words simultaneously. If the end user successfully identifies the known word, the end user's answer for the unknown word may be used by the CAPTCHA system to “solve” the unknown word. The technique for solving for unknown tests through end user input will be referred to herein as “reCAPTCHA.”
In addition to mechanisms designed to elicit and use one or more answers based on partially obscured and/or distorted graphic text, disclosed herein are systems, methods, techniques, and devices for CAPTCHAs that take advantage of various human cognitive processes that computers cannot accurately imitate. The terms “cognitive CAPTCHA” and/or “cognitive reCAPTCHA” will be used within the disclosure herein and further illustrated below to collectively refer to improved CAPTCHAs and reCAPTCHAs that exploit various human cognitive processes that computers cannot accurately imitate. Using the methods and systems disclosed herein, efficient, robust, scalable, and/or accurate test results may be achieved for distinguishing between humans and machines. While some examples herein refer to the English language, the systems and methods are applicable to humans that speak and/or understand other languages.
Example Cognitive CAPTCHAs
FIG. 1 illustrates a CAPTCHA system, according to some embodiments of the present disclosure. In the example embodiment of FIG. 1, the CAPTCHA environment 190 comprises a network 160 (including network 160A and network 160B), a CAPTCHA system 100, a user computing device 102, and a third party web server 110. Various communications between these devices are illustrated.
For example, the communication of a website request 112, a CAPTCHA plugin 114, a CAPTCHA request and/or data 116, user interaction data 118, and a validation request and/or response 120 are illustrated in various actions 1-5 that are illustrated in the circled numbers in FIG. 1. In this embodiment, the CAPTCHA system 100 includes a CAPTCHA generator 104, a CAPTCHA storage device 106, and a human validator 108, each of which is described in further detail below.
As shown in FIG. 1, at action one, the website request 112 is transmitted from the user computing device 102 to the third party web server 110 through the network 160. The website requested may be any website for which the operator/owner has implemented a CAPTCHA mechanism.
At action two, the third party web server 110 may transmit the CAPTCHA plugin 114 to the user computing device 102 through the network 160. The CAPTCHA plugin 114 may be sent with website data, which may have been in response to the website request 112. In some embodiments, the CAPTCHA plugin 114 may comprise source code instructions, data, and/or markup instructions, such as, but not limited to, JavaScript, XML, JSON, Hypertext Markup Language (“HTML”), and/or some combination thereof. For example, the CAPTCHA plugin 114, may be in a format such that web servers, similar to the third party web server 110, may embed the CAPTCHA plugin 114 in their websites and/or web applications without major alterations and/or modifications to their existing architectures. FIG. 2B illustrates an example cognitive CAPTCHA in a website. The website view 250 may correspond to the display of the website data with the CAPTCHA plugin 114 by a web browser.
At action three, there may be transmission of the CAPTCHA request and/or data 116 between the user computing device 102 and the CAPTCHA system 100 and/or the CAPTCHA generator 104 through the network 160. FIG. 2A illustrates an example cognitive CAPTCHA. The loading and/or execution of the CAPTCHA plugin 114 of FIG. 1 by a web browser, application, and/or other device may result in the display of the cognitive CAPTCHA 200 of FIG. 2A. Specifically, the loading and/or execution of the CAPTCHA plugin 114 may cause the user computing device 102 to transmit the CAPTCHA request 116. As a result, data comprising the text 202 of FIG. 2A, “We holld thee-se tru7ths to be slef-evidantt, that all men are cre8ted evil, that they are endowned by there Crator with cretin unalienable Lefts, that among thease are Life, Library and the pursuit of Hapyness,” may be transmitted by the CAPTCHA system 100 and/or the CAPTCHA generator 104 in response to CAPTCHA request 116 of FIG. 1 (either directly from the CAPTCHA system 100 to the user computing divide 102, or from the CAPTCHA system 100 to the user computing device 102 via the third party Web server 110). The data comprising the text 202 of FIG. 2A may correspond to the CAPTCHA data 116 of FIG. 1. The CAPTCHA generator 104 may retrieve the CAPTCHA data 116 from the CAPTCHA storage device 106.
At action four, the end user may interact with the CAPTCHA to transmit the user interaction data 118 to the third party web server through the network 160. For example, the end user may interact with the cognitive CAPTCHA 200 of FIG. 2A. As illustrated in FIG. 2A, the end user may interpret and/or read the text 202. The end user may then follow the instructions 204 to “[t]ype or speak the phrase with spelling and/or grammar corrections.” For example, the end user may type the phrase into the text box 206 and then click and/or press the submit button 210, which may cause the transmission of the user interaction data 118 of FIG. 1. The end user may also press and/or click the microphone icon 208 to speak the phrase into an input device of the user computing device, which may also cause the transmission of the user interaction data 118 of FIG. 1. In some embodiments, the cognitive CAPTCHA 200 may comprise a refresh button 212, such that if an end user clicks and/or presses the refresh button, the text and/or content 202 refreshes and/or changes. The end user may refresh the content of a cognitive CAPTCHA because the end user may find the content too difficult to interpret, read, understand, and/or solve. After several attempts, which may be configurable, the end user may be prohibited from refreshing the CAPTCHA to prevent against robots, computing devices, and/or machines from determining a correct answer to a cognitive CAPTCHA.
While some examples of cognitive CAPTCHAs in this disclosure may be limited to English, the techniques, systems, methods, and devices disclosed herein may be applicable to humans that speak languages other than English because human cognitive processing remains similar across languages, cultures, and/or nationalities. Furthermore, some examples of this disclosure may refer to one or more “humans,” and it may be assumed that the human has limited to native proficiency with the English language. Although, as previously mentioned, cognitive CAPTCHAs may apply broadly to human cognitive abilities and is not limited to any language. Furthermore, the term “human” as used within this disclosure may refer to an animal, because the cognitive processing by a human and/or animal differs from machine and/or computer processing.
The content of a cognitive CAPTCHA may distinguish between a human and a machine because human processing, interpretation, and/or perception occurs differs from computer and/or machine data processing. For example, human processing, interpretation, and/or perception may successfully understand words where the first and/or last letters are in the correct place, regardless of the order of the other letters in a word. Additional cues, such as the presence of other words in a sentence, the context of a word and/or sentence, semantics of the phrase and/or sentence when perceived together and/or as a whole, meaning of the words and/or sentence when perceived together and/or as a whole, word length, and/or any other human perception factors may further ease human processing. The meaning of a phrase and/or sentence may assist in successfully understanding the phrase and/or sentence by a human when there are errors because the meaning of the words of the phrase and/or sentence together, combined, and/or as a whole has additional meaning beyond the words individually. The content of a cognitive CAPTCHA may comprise the sentence, wholly or partially: “Four sorce and sveen years ago our faethrs bruohgt frtoh on this cotninent, a new naiton, cncievoed in Lrebirty, and ddeitaced to the prpsooitoin that all men are ceraetd euqal.” Due to human cognitive processing, most humans may be able to read the correct spelling of the words standing alone from the preceding quoted sentence. Furthermore, most humans may be able to read the words when placed in a phrase and/or sentence. For example, the above quoted sentence corresponds to the beginning of the Gettysburg Address, which may be a speech that many humans are familiar with. Thus, the meaning of the words from the Gettysburg Address together and/or combined has meaning beyond the individual words themselves that may assist in human interpretation and/or perception of the words. However, machines and/or computers may not possess knowledge in the same way that a human understands and/or has knowledge about the Gettysburg address and/or American history generally. Therefore, the human cognitive processing which may occur by a human to interpret misspelled words alone or in a sentence with context may be difficult for a machine to process and/or interpret.
The content 202 of the cognitive CAPTCHA 200 illustrates other aspects of human cognitive processing that may distinguish humans from machines. Human processing may be able to compensate for additional, missing, and/or substituted letters or symbols. For example, content 202 may comprise the text: “We holld thee-se tru7ths to be slef-evidantt, that all men are cre8ted evil, that they are endowned by there Crator with cretin unalienable Lefts.” While the correct spelling may be “We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights,” similar to the human cognitive processing that was able to process words and/or sentences with misplaced letters, human cognitive processing may be able to correctly interpret the words and/or phrase from the content 202. Similar to the difficulty a machine may have in interpreting the misplaced letters of words whether in a sentence or alone, it may be difficult for a machine to interpret content 202. Therefore, the addition, lack of, and/or substituted letters or symbols, may be used as part of a cognitive CAPTCHA test to distinguish between humans and machines.
In some embodiments, the cognitive CAPTCHA and/or the CAPTCHA system may be deployed in a manner that reduces the effectiveness of systems and devices designed to distribute CAPTCHA problems to outsourced CAPTCHA solving centers. For example, an automated data scraping system may encounter a CAPTCHA, do a screen capture, send the CAPTCHA to the screen of a worker in a center located in Brazil, and resume data scraping after the human in Brazil has solved the CAPTCHA. In some embodiments, by tying the cognitive CAPTCHA to linguistic, cultural, regional, and/or other characteristics of the intended end users of the CAPTCHA system, automated mechanisms that incorporate distributed human CAPTCHA solving are rendered ineffective or less effective. Taking the example further, if the automated data scraping system were attacking a site housing archives of California newspapers written in English, setting the CAPTCHAs to include a strong bias in favor of high-competence English speakers and/or those with cultural/historical knowledge of California and/or the United States would strongly limit the options for outsourcing of human CAPTCHA cracking. The examples illustrated herein also contemplate the countermeasures taken by a system against such a bias, for example, evaluating the language and/or cultural/historical bias of the CAPTCHAs and sending them for solution to persons with appropriate skills and/or background.
In some embodiments, homonyms and/or homophones may be used for the content of a cognitive CAPTCHA. For example, the text content 202 includes the word “there” 230, which is a homonym for the correct word “their” in that phrase's context. In another example, the content may comprise the text, “he came at me with an acts,” and the CAPTCHA test may ask the end user to correctly spell the phrase and/or sentence. “Acts” and “axe” are homonyms. Therefore, a human end user may be able to determine the correct answer and/or replace “acts” with “axe” because the words sound similar, which may be difficult for a machine to determine. In some embodiments, the end user may be asked to identify the incorrect homonym and/or homophone within a phrase and/or sentence. For example, the text may comprise, “the pair tasted sweet going past his pallet,” where “pair” (instead of “pear”) and “pallet” (instead of “palate”) were incorrect, whereas “past,” which has the homophone “passed,” was correct). Such distinctions may be difficult to identify programmatically, whereas human cognition may be able to identify the incorrect homonyms and/or homophones.
Certain techniques may be used to reduce human failures of cognitive CAPTCHAs, e.g., situations where humans fail a CAPTCHA test. For example, the greater the deviation from the correct presentation, the higher the likelihood that a human end user will unsuccessfully answer the CAPTCHA. Most humans may easily identify the term “Persident Obama,” “Persident Omaba” may be more difficult, and “Psdneiert Om baa” may be still more difficult. Finally, misplacing the first and last letters, such as, “Dnpretsei Aaomb,” may be too difficult for most humans to identify. Thus, to prevent human failures, certain structural and/or placements of letters should be avoided. For example, retaining sound groups and/or phonemes (such as “sh” or “ion”) in words may prevent human failures. Keeping letters close to their correct positions in words may also be useful to prevent human failures. To further prevent human failures, where additional letters and/or symbols are added, additional letters and/or symbols should be similar to the correct letters and/or symbols, and additional letters and/or symbols should not introduce a substantial additional element such as an extra syllable. For example, “holld” may be correctly spelled by a human because the extra “l” may not add an extra syllable to the world. In another example, “cr3ated” may be correctly interpreted by a human because the “3” resembles an “E” as interpreted and/or perceived by a human. However, by placing a word in context, it may be possible to alter the word in such a way that a false positive would be unlikely. For example, take the following sentence: “The most populous state is Cilfla77inor, located just south of Oregon.” A human may correctly read and/or interpret the word “California” based on knowledge of California being the most populous state and/or located south of Oregon. Similarly, one or more completely wrong words may be substituted, relying entirely on context to make the correction, as in “Thomas Edison held many patents, but is probably best known for inviting the light dlod.” In some embodiments, the difficulty of the phrase and/or word poses for human cognition may be manipulated by any one or a combination of these methods.
In some embodiments, audio cognitive CAPTCHAs may be used to distinguish between humans and machines. Audio cognitive CAPTCHAs may be desirable in some cases, such as, but not limited to, compliance with the Americans with Disabilities Act. Some of the techniques, systems, and/or methods in this disclosure, such as, but not limited to, substitution of an incorrect and/or misspelled word into a phrase, may be implemented as an audio cognitive CAPTCHA. An audio cognitive CAPTCHA and/or an audio component of a cognitive CAPTCHA may comprise a test where audio is played to an end user and the end user may type and/or speak the answer. For example, as illustrated in FIG. 2A, an end user may press and/or click the audio button 214 to be administered an audio test. The audio test may comprise audio playback and/or a recording of the text content 202 or other words and/or phrases.
In some embodiments, the end user may be asked to read and/or speak one or more words that may be a mispronunciation of a test word. For example, the cognitive CAPTCHA content may comprise the words “Phil Lying” (in text and/or audio) and the correct end user answer may be “filing” (where “Phil Lying” may be a mispronunciation of “filing”). Similarly, words with repeating adjacent sounds may together indicate a test word with the adjacent sounds reduced to a single sound, as in “Star Artling” corresponding to “startling” or “faux owning” corresponding to “phoning.” In the “Star Artling” example, the end of the word “star” may be the same sound as beginning of the word “artling,” and a human may be able to answer the test word “startling” from hearing and/or reading “Star Artling.”
In some embodiments, data for use in the CAPTCHA system may be gathered by harvesting, monitoring, or otherwise using corrections to computerized transcriptions of audio data. For example, a user of the “Siri” function on the iPhone may state “Do you need me to pick up Ben, Anna, and the baby on the way home?” However, the audio to text service that converts the spoken words to text may transcribe it as “Do you need me to pick up banana and the baby on the way home?” The user would then manually correct “banana” to “Ben, Anna.” In some embodiments, the data associated with the manual correction could be used as a source for a cognitive CAPTCHA, similar to the “Star Artling” example above.
In some embodiments, the end user may be asked to read and/or speak one or more words (which may comprise a nonsensical phrase and/or sentence), but when read together sound like another word or phrase with an alternative reading. For example, the cognitive CAPTCHA content may comprise the words “easel aid ease man” and the correct answer may be “he's a lady's man” because the test content when read aloud and/or silently by a human end user may phonetically sound like and/or be similar to the test answer when interpreted by a human end user. In another example, the test content may be “know sayer” and the test answer may be “nose hair.” A machine and/or computer, even with a phonetic dictionary, may find it very difficult to find the associations between the unrelated words and/or phrases based on phonetic sounds. In some embodiments, one or more photographic and/or artistic images, whether rendered accurately, distorted, or otherwise, may be presented to aid the human in understanding the problem presented by the CAPTCHA. For example, in the “know sayer” example, a drawing with two dots at the top, an inverted triangle in the center of the middle and the bottom half of a circle at the bottom, with a slight line coming out of one part of the triangle, may be enough to prevent a false negative and/or human failure of the cognitive CAPTCHA (by providing the human with a crude image of a face with an artifact near the nose).
In some embodiments, cognitive CAPTCHAs may comprise heteronyms. A heteronym is one of two or more words that have the same spellings but different meanings and pronunciations. In some embodiments, the end user may be asked to identify the incorrectly pronounced word or words. For example, an audio phrase may be “You polish the record,” where “polish” is pronounced as if referencing the country Poland, and/or “record” is pronounced as if referencing writing something down. In another example, the audio phrase may be “please write about an interesting object,” where “object” is pronounced as if referencing somebody with an objection to a policy. A human may be able to identify each of the incorrectly pronounced words, while a computer and/or machine would be unlikely to succeed at the same task. In some embodiments, it may be desirable to include words with heteronyms, but to pronounce those words correctly so as to frustrate attempts to defeat the CAPTCHA by a machine with a dictionary of heteronyms. In some embodiments, written heteronyms may be used. For example, a person may be asked to identify the correct meaning of each heteronym. FIG. 2C illustrates an example cognitive CAPTCHA comprising a written heteronym. The cognitive CAPTCHA comprises text 250, “[p]lease write about an interesting object.” The end user must choose between definition A 252, “to disagree with something or oppose something,” and definition B 254, “a thing that you can see and touch.” A human may select the correct choice, definition B 254, from understanding the context of the sentence, but it may be difficult for a computer and/or machine to select definition B 254.
Returning to FIG. 1, at action five the third party web server 110 may transmit a validation request 116 to the CAPTCHA system 100 and/or the human validator 108 through the network 160. The validation request 116 may comprise some or all of the user interaction data 118. Furthermore, the validation request 116 may comprise the answer and/or response from the end user based on the cognitive CAPTCHA test, a test identifier, the content of the cognitive CAPTCHA, such as the text content 202 of FIG. 2A, and/or an identifier for the content. The human validator 108 may then load the correct answer from the CAPTCHA storage device 106 and compare it to the answer and/or response from the end user. The human validator 108 may then send the validation response 116 to the third party web server 110 through the network 160 indicating whether the end user passed or failed the cognitive CAPTCHA test. The third party web server 110 may then use the validation response 116, e.g., to permission the end user for some activity and/or allow the end user to access some content. In some embodiments, the user interaction data 118 is sent directly to the CAPTCHA system 100 rather than via the third party web server 110, in this embodiment, a validation response (e.g. confirming that the user provided the correct interaction data for the CAPTCHA) may be provided to the third party web server 110 after the human validator 108 of the CAPTCHA system processes the user interaction data 118 received directly from the user computing device 102.
In some embodiments, it may be desirable for determination and/or any computation based on the end user answer and/or response to occur in the CAPTCHA system 100 instead of the user computing device 102. For example, if validation occurred through JavaScript that may be executed on the user computing device 102, a machine and/or computer may able to automatically inspect, decompile, and/or analyze the JavaScript source code to determine the correct answer, and, therefore, could defeat the cognitive CAPTCHA.
Example Moiré CAPTCHAs
In some embodiments, moiré patterns may be used, alone or in combination with the techniques, methods, and/or systems disclosed herein, as cognitive CAPTCHAs. A moiré pattern may be a visual pattern. For example, two identical patterns may be overlayed and/or superimposed to create a moiré pattern. In some examples, two patterns may be displaced and/or rotated a small amount from one another to create a moiré pattern. In some embodiments, cognitive CAPTCHAs with moiré patterns may allow the end user to control one or more characteristics and/or features of the grids, patterns, and/or interactions between the grids and/or patterns.
FIG. 3A illustrates an example cognitive CAPTCHA comprising a moiré pattern test. The cognitive CAPTCHA 300 may comprise an instruction 330, a first circle pattern 302, a second circle pattern 304, a pattern adjuster 305, a submit button 310, and a refresh button 312. The end user may be prompted with instruction 330 to “[a]djust the circles to make an eye.” First circle pattern 302 may comprise twenty circles with the same origin, but with uniformly increasing radiuses. Second circle pattern 304 may be identical or similar to first circle pattern 302, but with a different vertical and/or horizontal coordinate for its origin. Differences between the two circles (e.g., number of rings, size of rings, coloring, etc.) may be implemented in other embodiments in order to cause the desired Moiré effect when the circles are properly overlapped. Additionally, any other shapes may be used in such a moiré-based CAPTCHA.
As illustrated by FIG. 3A, there may initially be no overlap between first circle pattern 302 and second circle pattern 304. The end user may select, touch, and/or press the dial 306 of the pattern adjuster 305 (or drag-and-drop the circles themselves in one embodiment). Dial 306 may be adjusted and/or its location may be moved as illustrated by arrow 307, which may adjust the proximity and/or location of the first circle pattern 302 and/or the second circle pattern 304.
FIG. 3B, illustrates cognitive CAPTCHA 300 after end user interaction. For example, the ender user may have interacted with the pattern adjuster 305, by adjusting and/or moving the dial 306 to a new position. As a result, the proximity and/or location of the first circle pattern 302 and/or the second circle pattern 304 may have changed. A moiré pattern may have been created from the overlap of first circle pattern 302 and second circle pattern 304. For example, the overlap between first circle pattern 302 and the second circle pattern 304 may have created a visual pattern with a dark and/or solid oval center and/or a grid and/or dotted surrounding pattern. The moiré pattern from the overlap of first circle pattern 302 and second circle pattern 304 may appear to be an “eye” as perceived and/or interpreted by a human. As a result, a human end user may click and/or press the submit button 310 because the human end user perceived and/or interpreted the visual pattern to be an “eye.” If the end user selects positions of the first circle pattern 302 and the second circle pattern 304 within a specified range of overlap then the CAPTCHA system may authenticate and/or validate the end user as a human.
Example cognitive CAPTCHA 300 comprising a moiré pattern test may distinguish between human and machine end users for several reasons. The following reasons are illustrative and there may be additional reasons why the cognitive CAPTCHA 300 is successful. For example, it may difficult for a computer and/or machine to interpret and/or analyze a moiré pattern similar to how a human may interpret a moiré pattern through cognitive processing. It may be difficult to mathematically and/or programmatically correlate a moiré pattern to visual representations of objects and/or things, whereas such correlations may immediately occur to humans due to cognitive processing. Furthermore, it may be difficult to program and/or instruct a machine to interact with the user interface of a cognitive CAPTCHA comprising a moiré pattern test. For example, the pattern adjuster 305 of cognitive CAPTCHA 300 may be difficult to be interacted with by a machine and/or computer. Therefore, cognitive CAPTCHA 300 comprising a moiré pattern test may be successful at distinguishing between humans and machines.
In some embodiments, similar to the refresh button 212 of FIG. 2A, the refresh button 312 of cognitive CAPTCHA 300 of FIG. 3A may change and/or alter content of the cognitive CAPTCHA. For example, by clicking and/or pressing the refresh button 312, the visual patterns displayed and/or the instruction 330 may change and/or alter.
FIG. 3C illustrates an example cognitive CAPTCHA comprising an alternative moiré pattern test. The instruction 330 of FIG. 3C may instruct the end user to “[a]djust the circles to make stripes” or “[a]djust the circles to make an asterisk-like shape in the overlapping area.” The instruction 330 of FIG. 3A and FIG. 3C may have changed from an end user clicking and/or pressing the refresh button 312 of FIG. 3A. Similar to the end user interaction illustrated by FIG. 3A and FIG. 3B, the end user may adjust the pattern adjuster 305. As a result, a moiré pattern may have been created from the overlap of first circle pattern 302 and second circle pattern 304 of FIG. 3C. For example, the overlap between first circle pattern 302 and the second circle pattern 304 may have created a visual pattern, such as stripes as interpreted and/or viewed by a human end user.
In some embodiments, there may be some variations of the moiré patterns of cognitive CAPTCHAs. Moiré patterns may not be limited to circle patterns. For example, moiré patterns may comprise boxes, rectangles, lines, and all variations of shapes, figures, and/or lines. Moiré patterns may comprise variations of colors and not just black and/or white.
In some embodiments, there may be variations of the available user interactions with cognitive CAPTCHAs comprising moiré patterns. For example, the width of the lines, the number of lines, the speed and/or direction of rotation of the shapes and/or patterns, size of the shapes and/or patterns, relative position of the shapes and/or patterns, and/or colors of the lines, shapes, and/or patterns may all or in some combination thereof be modifiable by the end user to create moiré patterns. In some embodiments, alteration and/or modifications to the moiré patterns may be accomplished by moving, dragging, and/or dropping shapes and/or patterns through mouse input and/or touch input. For example, change of the relative position of first circle pattern 302 and second circle pattern 304 of cognitive CAPTCHA 300 in FIG. 3A may occur by touch screen dragging and dropping of first circle pattern 302 and/or second circle pattern 304. Furthermore, alteration and/or change of the position of the shapes and/or patterns may not be limited to horizontal movement. For example, the height and/or Y position of one or more of the shapes and/or patterns may be altered and/or changed.
In some embodiments, the cognitive CAPTCHA 300 of FIG. 3A may correspond to the CAPTCHA plugin 114 and/or the loading and/or execution of the CAPTCHA plugin 114 of FIG. 1.
Moiré patterns of cognitive CAPTCHAs may be in various formats. Moiré patterns may comprise formats such as source code and/or code instructions, graphic files, vector image formats such as the scalable vector graphic (“SVG”) format, a database format, files, Extensible Markup Language (“XML”), JavaScript Object Notation (“JSON”), a file format that is proprietary to the CAPTCHA system, any other format and/or some combination thereof.
FIG. 3D illustrates example data comprising a moiré pattern of a cognitive CAPTCHA. Moiré data 370 may correspond to the first circle pattern 302 and/or second circle pattern 304 of FIG. 3A. Moiré data 370 illustrates an example XML and/or SVG format used to create the moiré patterns in FIGS. 3B and FIG. 3C. The tags and/or elements of moiré data 370 are illustrative and, thus, may not be syntactically complete and/or correct. Moiré data 370 may comprise twenty “<circle . . . >” elements. Each circle element may be initially positioned at the coordinate “x=‘0’ y=‘0’,” but may have increasing radiuses. For example, the radius of the circle element with identity “circle1” may comprise a radius of “0.065,” the radius of the circle element with identity “circle2” may comprise a radius of “0.165,” and so on in an increasing series until the circle element with identity “circle20” may comprise a radius of “1.965.” Moiré data 370 may correspond to one circle pattern and may be duplicated and/or repeated to correspond to one or more additional circle patterns.
In some embodiments, the pattern data, such as example moiré data 370, may be combined with other techniques and/or methods to create a cognitive CAPTCHA and/or moiré pattern. For example, moiré data 370 may be transformed and/or translated by changing the coordinates of the origin and/or the X and/or Y coordinates. Pattern data, such as example moiré data 370 may be combined with source code and/or code instructions to manipulate and/or transform the pattern and/or shape data. The pattern data, following end user interaction, may be transmitted along with other data to validate and/or authenticate a human end user.
Where a dynamic image and/or pattern caused by code instructions and/or pattern data is not desirable, a series of static images may be presented to the end user to determine image selection based on moiré qualities. For example, the various images of the circle patterns from FIGS. 3A, 3B, and/or 3C may be displayed to the end user and the end user may be asked to identify the image corresponding to an “eye” or “stripes.”
In some embodiments, formulas may be used to represent and/or characterize moiré patterns. For example, a shape moiré and/or band moiré may comprise a revealing layer comprising black lines with transparent lines and a base layer comprising periodically repeating shapes. When the revealing layer is overlayed and/or superimposed over the base layer, the repeating pattern in the base layer is stretched and/or runs along the vertical axis. Furthermore, the shapes and/or patterns that are created are magnified versions of the repeating pattern. In some embodiments, a band moiré pattern may be represented by the following formula:
P m = P b * P r P b - P r
Pb may denote and/or indicate the period of shapes in the base layer. Pr may denote and/or indicate the period of transparent lines in the revealing layer. Pm may denote and/or indicate the size of the optical shapes magnified along the vertical axis and/or the period of the moiré shapes and/or lines.
An example of the formula may be the following. For example, both the base layer and the revealing layer may comprise repeating parallel lines. The period of the base layer, Pb, i.e., the space between the parallel lines, may be thirteen. The period of the revealing layer, Pr, may be twelve. The period of moiré lines, Pm, may be one hundred and fifty six. Thus, various moiré patterns may be generated by altering the input numbers Pb and Pr.
In some embodiments, similar to any computation and/or validation that may be desirable to occur in the CAPTCHA system, it may be desirable for some or all of the code instructions that may transform the content of a cognitive CAPTCHA to occur in the CAPTCHA system. For example, some of the user interaction data may be transmitted to the CAPTCHA system and the CAPTCHA system may stream the content, such as the image and/or audio, to the end user computing device.
In some embodiments, there may be some variations of cognitive CAPTCHAs comprising moiré patterns to prevent scaling. Moiré patterns and/or effects may be affected and/or impacted by changes to device screen resolutions and/or upscaling or downsizing of images. In some embodiments, code instructions may be used to prevent rescaling. For example, there may be HTML markup instructions instructing the web browser and/or viewing device not to scale. In some embodiments, the end user may be informed that scaling may prevent a proper cognitive CAPTCHA test. In some embodiments, the cognitive CAPTCHA may determine the available space in the end user's screen and/or display and generates a pattern that does not require scaling. In some embodiments, the CAPTCHA system may alter the pattern data and/or pattern based on the end user computing device and/or may validate and/or authorize the end user based on end user computing device's particular configuration and/or settings. For example, display type and size may be determined through HTTP headers, local variables, and/or other methods.
Example Moiré CAPTCHA—Website Implementation
In some embodiments, cognitive CAPTCHAs comprising moiré patterns may be implemented in websites. FIG. 4A illustrates an example cognitive CAPTCHA implementation. The cognitive CAPTCHA 400 may comprise an instruction 410, a first circle pattern 402, a second circle pattern 404, and a pattern adjuster 405. The components of CAPTCHA 400 may comprise similar functionality to the components of cognitive CAPTCHA 300 of FIG. 3A. For example, the pattern adjuster 405 may adjust the relative positions of the first circle pattern 402 and/or the second circle pattern 404. An end user, upon visiting the example website 450 through a web browser may interpret and/or read the instruction 410 to “[m]aintain an eye, otherwise you will be logged out in 60 seconds.” The cognitive CAPTCHA 400 may remain visible throughout a session at the website 450 and/or be brought back to visibility at some point within a session. As time passes and/or in response to other events, the settings of the cognitive CAPTCHA 400 may be altered and/or appear to drift from the end user's selected settings. For example, as illustrated by FIG. 4B, the cognitive CAPTCHA 400 may have altered and/or changed after the elapse of time. The relative positions of first circle pattern 402 and/or a second circle pattern 404 may have drifted to their respective current positions of no overlap as illustrated by FIG. 4B. Furthermore, instruction 410 may have changed to comprise the text of “59 seconds remaining to make an eye . . . ” to indicate to the end user that a logout will occur if further user interaction is not taken. For example, FIG. 4C may illustrate the cognitive CAPTCHA 400 after further end user interaction. For example, to avoid from being logged out, the end user may have interacted with the pattern adjuster 405 to adjust the relative positions of the first circle pattern 402 and/or the second circle pattern 403 to within a range and/or threshold to validate and/or authenticate a human end user.
In some embodiments, cognitive CAPTCHA 400 may fade in and/or out. For example, once the cognitive CAPTCHA 400 is reset, the CAPTCHA 400 may fade out because user interaction is not necessary. However, as the logout period gets closer, the cognitive CAPTCHA 400 may fade in, become more prominent, bolder, and/or highlighted to indicate to the end user that further interaction may be necessary.
In some embodiments, the patterns and/or tests of the cognitive CAPTCHA 400 may change over time. For example, the instruction 410 may change from requiring making an “eye” to “stripes.” In some embodiments, the patterns themselves may change from circles to squares and/or other shapes over time.
There may be several advantages to persistent cognitive CAPTCHAs as illustrated by FIG. 4. For example, authentication and/or reauthentication mechanisms may often annoy end users because such mechanisms completely interrupt the end user's session and/or experience. In the example cognitive CAPTCHA 400, a user may adjust the settings as needed during breaks of website activity and/or other periods when it is less intrusive. The use of persistent and/or drifting cognitive CAPTCHAs is not limited to moiré patterns as shown in FIG. 4, but rather may be used with any other CAPTCHAs and/or systems, methods, and/or techniques disclosed herein. Additional advantages of persistent cognitive CAPTCHAs may include thwarting outsourcing of CAPTCHA “solving.” For example, teams of human end users, such as hundreds or thousands of people, may be employed to solve and/or complete CAPTCHAs to provide the answers to automated computer systems to bypass human validation systems in the future. However, if systems and/or websites employ persistent CAPTCHAs, it may be very difficult or impossible to design computer systems to continuously interact with persistent cognitive CAPTCHAs. Furthermore, it may be prohibitively expensive and/or economically infeasible to employee human operators to remain logged into websites and/or systems that comprise persistent cognitive CAPTCHAs. Therefore, persistent cognitive CAPTCHAs may further promote distinguishing between humans and machines and discourage the outsourcing of solving CAPTCHAs.
Example Pattern CAPTCHAs
In some embodiments, cognitive CAPTCHAs may comprise various visual patterns. Another aspect of the difference between human perception and interpretation by computers is that human cognitive processing may easily identify and/or infer patterns within objects and/or images. For example, a human looking at clouds in the sky or pictures of clouds may see an elephant, a car, or a person. On the other hand, a computer presented with a variety of photographs of clouds would find it difficult to identify which of the clouds a human would perceive as an object, such as an elephant. Another example of finding representations of objects within an unrelated image may include inkblot and/or rorschach patterns.
FIG. 5A illustrates an example cognitive CAPTCHA comprising a rorschach pattern. The user interface of cognitive CAPTCHA 500 may comprise a submit button 510, and a refresh button 512, an audio button 514, a microphone 508, and a text box 506, which may behave similarly to the user interface of cognitive CAPTCHA 200 of FIG. 2. Cognitive CAPTCHA 500 may comprise pattern 502 that may be a digital inkblot and/or rorschach pattern. A feature of pattern 502 may be that the pattern is symmetrical. Pattern 502 may have been automatically and/or randomly generated by a system such as the CAPTCHA system. Instructions 504, “[w]hat do you see,” may prompt the end user to type and/or respond with an object and/or idea that the human end user associates with the pattern 502. For example, human end users may perceive, interpret, and/or see a “person” by looking at pattern 502 because the inkblot appears to have a head, body, arms, and/or legs, which comprise a human and/or person drawing.
Cognitive CAPTCHAs may comprise audio and/or recordings that elicit unrelated identifications and/or pattern recognitions. For example, if the end user presses and or clicks the audio button 514, the end user may be played randomly generated audio noises and/or sounds to elicit identification with objects and/or things, such as an association with the “ocean” because a human end user may interpret the sounds as sounds of the ocean.
ReCAPTCHAs may be applied visual, moiré, audio, and/or other types of patterns. FIG. 5B illustrates an example cognitive reCAPTCHA comprising rorschach patterns. Cognitive reCAPTCHA 520 may comprise pattern 502 and pattern 530. For example, pattern 502 may be a known and/or solved pattern where the correct human validation answer is “person.” However, the pattern 530 (which may have been randomly and/or automatically generated by the CAPTCHA system) may be an unknown and/or unsolved. In other words, there may be no known association with what the pattern 530 looks like when perceived by humans. For example, humans may interpret and/or perceive pattern 530 as a hat with eye and/or a car. Therefore, when end users submit answers through the cognitive reCAPTCHA 520, if the answer to pattern 502 is correct, then the CAPTCHA may store and/or use the second answer to the pattern 530 (such as “hat” or “car”). As a result, the CAPTCHA system may collect answers to unknown visual, audio, and/or other types of patterns, which may be randomly and/or automatically generated. In some embodiments, the first answer to a validated unknown pattern will be saved and/or stored as the answer to that pattern. In some embodiments, an unknown pattern will be “solved” when the number of answers for that unknown pattern surpasses a given and/or configurable threshold.
In some embodiments, cognitive CAPTCHAs comprising visual representations may be asymmetric, such as, but not limited to, images and/or representations of clouds.
In some embodiments, cognitive CAPTCHAs may comprise visual and/or audio vibrations. Regarding visual vibrations, a result of the biological properties of the human eye and/or human brain is that humans may perceive an image as changing and/or moving when the image may be vibrating. For example, a three dimensional image may be generated from vibrating and/or oscillating the image. It may be difficult to program code instructions of a computer and/or machine to mimic human perception to recognize patterns and/or movements from visual vibrations. In a similar manner, interference between sound waves and/or filtering of sound waves may also be used in cognitive CAPTCHAs. A voice and/or other signal may be embedded within a sound that contains other, masking sounds. In some embodiments, a human voice recording may be isolated at a frequency and/or frequency range (such as using an auto-tuner) and masking sounds may be kept out of that frequency range in whole or in part. For example, a human voice recording may be auto-tuned to two kilohertz and/or masking noises introduced at higher volumes and/or frequencies at other portions of the range, but at a volume and/or frequency over which a human voice can be heard at two kilohertz. The end user would then be prompted to use an equalizer function to reduce and/or eliminate noises at other ranges, which may move and/or shift the range until the end users identifies the voice. In some embodiments, the end user may be asked to identify the end users' own voice in a range of voices and/or noise recordings.
In some embodiments, the phenomenon of human visual persistence may be used to create or enhance CAPTCHAs. Indeed, in this manner, a CAPTCHA could be presented in an output window, such as, but not limited to, a command line window. For example, a program may generate a random or semi-random stream of character lines (for example, ten or forty character lines). FIG. 5C illustrates an example cognitive CAPTCHA comprising a visual persistence pattern. Cognitive CAPTCHA 550 comprises an output window 562 with text output 564. The text output 564 may be random and/or semi-random. FIG. 5D illustrates the text output 564 after the elapse of time. In the example, the cognitive CAPTCHA 550 may stream new lines of characters to create the visual pattern of waves as perceived by a human end user. For example, the lines of text may scroll up the screen as new lines of text are added at the bottom (or scrolling in the opposite direction in some embodiments) to illustrate some object or movement that isn't obvious in a single snapshot of the output window 562. The correct answer to cognitive CAPTCHA 550 may be “waves” and/or “waving.” It may be difficult for a machine to recognize such a pattern. In some embodiments, the end user may be provided several multiple choice answers to select from.
In some embodiments, a cognitive CAPTCHA with an output window may rearrange the lines by swapping one or more characters in a manner that creates a pattern as multiple lines scroll past. In one aspect, this could be done by having the character “l” or the number one (“1”) or the exclamation point (which are all similar in that they are vertical lines) move between positions as the lines go past, following a pattern such as “move to the right, wait a short time, move to the right twice more with an even shorter delay, then slowly move back left.” For example, the pattern of “move to the right, wait a short time, move to the right twice more with an even shorter delay, then slowly move back left,” may be one of several multiple choice answers for the end user to select from. A human may identify the pattern (e.g., the movement of a particular character or group of characters), whereas a machine would have difficulty doing so. Such difficulty may be increased if different characters are used, such as, but not limited to, a blank space, characters with primarily horizontal lines, characters with two vertical lines, etc. In some embodiments, the character need not be present on every line, so the composition of the line characters in the aggregate can be random, although the rearrangement would not be.
In some embodiments, visual persistence may be used to create patterns in flowing artwork and/or graphics. For example, many music “visualizers” create graphical patterns that move in conjunction with changes to ambient sound. Such changes, with or without the sound, present patterns easily noticed by a human but far more difficult to identify for a computer. In some embodiments, the end user may be asked to speak in a certain pattern to create a specified effect in a visualize as part of a CAPTCHA (e.g., “make the visualizer bump in a manner similar to the beat of the chorus of Queen's ‘We Will Rock You’”).
In some embodiments, cognitive CAPTCHAs may comprise animations and/or request the end user to identify actions and/or verbs (e.g., rather than the actual objects in the images). For example, using the output window and/or command line techniques illustrated above, the cognitive CAPTCHA may display a text-based stick figure walking and/or a horse galloping. Thus, the correct answer to the example cognitive CAPTCHA may be an action word and/or verb, such as, but not limited to, “walking,” “running,” “galloping,” etc. In some embodiments, the cognitive CAPTCHAs may comprise animation formats and/or techniques, such as, but not limited to, Graphic Interchange Format (“GIF”), Flash, SVG, XML, JavaScript, AJAX, and/or some combination thereof. Unlike human end users, it may be difficult for computers and/or machines to identify actions because some computers and/or machines may be programmed for object and/or image recognition. Cognitive CAPTCHAs comprising animations and/or verb tests may be combined, in part or whole, with other methods, systems, and/or techniques described in this disclosure.
In some embodiments, patterns may be generated through printed patterns, patterns on digital methods, and/or other methods of displaying content other than through computing systems. In some embodiments, content may be encrypted through the systems, methods, devices, and/or techniques disclosed herein. In some embodiments, the systems, methods, devices, and/or techniques disclosed herein related to cognitive CAPTCHAs may be used as passwords and/or components of passwords. For example, an end user may adjust a moiré pattern to a certain level and/or threshold, such as the moiré patterns illustrated in FIG. 3B and/FIG. 3C, to validate and/or authorize the end user. In some embodiments, the circle moiré patterns may visually recognize the look and/or feel of a combination lock.
Example CAPTCHA Delivery Methods
In some embodiments, the delivery and/or transmission of the CAPTCHA may be varied to verify and/or validate a human end user. The systems, methods, devices, and/or techniques disclosed in the Location reference may be used with CAPTCHAs. For example, a CAPTCHA may be sent by text message and/or email to an end user's mobile device according to the systems, methods, devices, and/or techniques disclosed in the Location reference and/or otherwise. In some embodiments, the CAPTCHA may be sent only to a particular network, which may frustrate the outsourcing of CAPTCHA breakers to teams of humans who may be located outside of the particular network. In some embodiments, the CAPTCHA may only accept answers sent from a particular location and/or locale, which may also prevent the outsourcing situation. In some embodiments, cognitive CAPTCHAs may be prohibited from being displayed on mobile devices and/or particular mobile devices to guarantee proper display of the cognitive CAPTCHA.
Example Search Engine Capture Management
In some embodiments, the systems, methods, devices, and/or techniques disclosed herein may be used for search engine capture management. A persistent problem for web publishers, such as, but not limited to, Twitter posters, blog writers and/or bloggers, and/or article publishers, is that web publishers may be unable to manage how search engines, web crawlers, and/or other web services digitally us and read their content. For example, an article regarding breast cancer is published and/or posted to the Internet, the article may be indexed by a search engine and/or returned by search engines for searches of pornography. Furthermore, pornographic advertisements may appear in proximity to the article when displayed in search results. There may be a convention for search engines and/or other web services to read the robots.txt file and/or refuse to index pages indicated as excluded in that file, search engines and/or other web services may simply ignore the robots.txt file. However, using the systems, methods, devices, and/or techniques disclosed herein regarding cognitive language techniques the content that search engines and/or other web crawlers index may be managed and/or limited. For example, the text article provided to the search engine and/or other web crawler may contain the misspelled word “breats,” which may be properly interpreted by human end users but may not be indexed by automated search engines and/or other web crawlers. In some embodiments, the type of alteration may be based on at least in part on the entity, device, service, and/or Internet Protocol address requesting the data. For example, the Google search engine may receive the altered data and/or text while a medical search engine may receive the unaltered data and/or text. In some embodiments, an image may be altered based on the requesting service. Similar to the altered text data, a blacked out and/or censored image of a breast may be sent to the search engine but the correct image may be sent to the medical search engine.
Example Digital Watermarking
In some embodiments, the systems, methods, devices, and/or techniques regarding cognitive language processing disclosed herein may be used for digital watermarking. In some embodiments, misspellings and/or substitutions of letters and/or symbols may be introduced to digital documents as a form of a digital signature and/or unique identifier. For example, the intentional introduction of errors, such as “1” (the number one) in place of the letter “l”, may be used to uniquely identify a document that is copied. Additional changes may be made, such as adding spaces, changing single quotes to double quotes, changing a short dash to a long dash, changing semi-colons to colons or periods, substituting abbreviations or contractions for their longer counterparts, changing capitalization of words, changing spelling of words amenable to multiple spellings or regionally different spellings (i.e. color vs. colour), substitution of synonyms, substitution of a negating word and an antonym, the reverse of all of the foregoing, and/or any other changes. By making such changes, data may be placed into a document that is not apparent to a human end user. In some embodiments, the types of changes that may be made do not trigger a spell check flag and/or alert and/or an automatic correction by optical character reading software and/or word processing software. In some embodiments, additional changes may be made to the document unrelated to the one or more unique identifiers such that a plurality of copies of the document cannot be easily compared in order to identify the digital watermark.
In some embodiments, digital watermarks may be embedded in a document and/or stored in a database to indicate one or more end users and/or persons that have been given permissions to access the document. For example, if a scientific article hosted on a web page and/or website was tracked according to one or more of these mechanisms, the identity of the subscriber, the IP address used for access, and/or other information may be entered into a database together with an entry indicating the watermarking done to the document associated with that information.
Implementation Mechanisms
The various computing device(s) discussed herein, such as the CAPTCHA system 100 of FIG. 1, are generally controlled and coordinated by operating system software, such as, but not limited to, iOS, Android, Chrome OS, Windows XP, Windows Vista, Windows 7, Windows 8, Windows Server, Windows CE, Unix, Linux, SunOS, Solaris, Macintosh OS X, VxWorks, or other compatible operating systems. In other embodiments, the computing devices may be controlled by a proprietary operating system. Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file system, networking, I/O services, and provide a user interface functionality, such as a graphical user interface (“GUI”), among other things. The CAPTCHA system 100 may be hosted and/or executed on one or more computing devices with one or more hardware processors and with any of the previously mentioned operating system software.
FIG. 6 is a block diagram that illustrates example components of the CAPTCHA system 100. While FIG. 6 refers to the CAPTCHA system 100, any of the other computing devices discussed herein may have some or all of the same or similar components.
The CAPTCHA system 100 may execute software, e.g., standalone software applications, applications within browsers, network applications, etc., whether by the particular application, the operating system, or otherwise. Any of the systems discussed herein may be performed by the CAPTCHA system 100 and/or a similar computing system having some or all of the components discussed with reference to FIG. 5.
The CAPTCHA system 100 includes a bus 602 or other communication mechanism for communicating information, and a hardware processor, or multiple processors, 604 coupled with bus 602 for processing information. Hardware processor(s) 604 may be, for example, one or more general purpose microprocessors.
The CAPTCHA system 100 also includes a main memory 606, such as a random access memory (RAM), cache and/or other dynamic storage devices, coupled to bus 602 for storing information and instructions to be executed by processor(s) 604. Main memory 606 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor(s) 604. Such instructions, when stored in storage media accessible to processor(s) 604, render the CAPTCHA system 100 into a special-purpose machine that is customized to perform the operations specified in the instructions. Such instructions, as executed by hardware processors, may implement the methods and systems described herein for sharing security information.
The CAPTCHA system 100 further includes a read only memory (ROM) 608 or other static storage device coupled to bus 602 for storing static information and instructions for processor(s) 604. A storage device 610, such as a magnetic disk, optical disk, or USB thumb drive (Flash drive), etc., is provided and coupled to bus 602 for storing information and instructions. The CAPTCHA storage device 106 FIG. 1 may be stored on the main memory 606 and/or the storage device 610.
In some embodiments, the CAPTCHA storage device 106 of FIG. 1 is a file system, relational database such as, but not limited to, MySql, Oracle, Sybase, or DB2, and/or a distributed in memory caching system such as, but not limited to, Memcache, Memcached, or Java Caching System.
The CAPTCHA system 100 may be coupled via bus 602 to a display 612, such as a cathode ray tube (CRT) or LCD display or touch screen, for displaying information to a computer user. An input device 614 is coupled to bus 602 for communicating information and command selections to processor 604. One type of input device 614 is a keyboard including alphanumeric and other keys. Another type of input device 614 is a touch screen. Another type of user input device is cursor control 616, such as a mouse, a trackball, a touch screen, or cursor direction keys for communicating direction information and command selections to processor 604 and for controlling cursor movement on display 612. This input device may have two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane. In some embodiments, the same direction information and command selections as cursor control may be implemented via receiving touches on a touch screen without a cursor.
The CAPTCHA system 100 may include a user interface unit to implement a GUI, for example, FIGS. 2, 3, 4, and/or 5, which may be stored in a mass storage device as executable software codes that are executed by the computing device(s). This and other units may include, by way of example, components, such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables.
The CAPTCHA system 100 and/or the CAPTCHA plugin 114 of FIG. 1 may be configured to be compatible with web browsers such as, but not limited to, Firefox, Internet Explorer, Safari, and/or Chrome.
In general, the word “instructions,” as used herein, refers to logic embodied in hardware or firmware, or to a collection of software units, possibly having entry and exit points, written in a programming language, such as, but not limited to, Java, Lua, C, C++, or C#. A software unit may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, but not limited to, BASIC, Perl, or Python. Certain web programming methods may be used such as AJAX. It will be appreciated that software units may be callable from other units or from themselves, and/or may be invoked in response to detected events or interrupts. Software units configured for execution on computing devices by their hardware processor(s) may be provided on a computer readable medium, such as a compact disc, digital video disc, flash drive, magnetic disc, or any other tangible medium, or as a digital download (and may be originally stored in a compressed or installable format that requires installation, decompression or decryption prior to execution). Such software code may be stored, partially or fully, on a memory device of the executing computing device, for execution by the computing device. Software instructions may be embedded in firmware, such as an EPROM. It will be further appreciated that hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors. Generally, the instructions described herein refer to logical modules that may be combined with other modules or divided into sub-modules despite their physical organization or storage.
The CAPTCHA system 100, or components of it, such as the CAPTCHA generator 104 and/or the human validator of FIG. 1 and/or FIG. 6, may be programmed, via executable code instructions, in a programming language.
The term “non-transitory media,” and similar terms, as used herein refers to any media that store data and/or instructions that cause a machine to operate in a specific fashion. Such non-transitory media may comprise non-volatile media and/or volatile media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 610. Volatile media includes dynamic memory, such as main memory 606. Common forms of non-transitory media include, for example, a floppy disk, a flexible disk, hard disk, solid state drive, magnetic tape, or any other magnetic data storage medium, a CD-ROM, any other optical data storage medium, any physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge, and networked versions of the same.
Non-transitory media is distinct from but may be used in conjunction with transmission media. Transmission media participates in transferring information between nontransitory media. For example, transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 602. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
Various forms of media may be involved in carrying one or more sequences of one or more instructions to processor(s) 604 for execution. For example, the instructions may initially be carried on a magnetic disk or solid state drive of a remote computer. The remote computer may load the instructions into its dynamic memory and send the instructions over a telephone or cable line using a modem. A modem local to the CAPTCHA system 100 may receive the data on the telephone or cable line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 602. Bus 602 carries the data to main memory 606, from which the processor(s) 604 retrieves and executes the instructions. The instructions received by main memory 606 may retrieve and execute the instructions. The instructions received by main memory 606 may optionally be stored on storage device 610 either before or after execution by processor(s) 604.
The CAPTCHA system 100 also includes a communication interface 618 coupled to bus 602. Communication interface 618 provides a two-way data communication coupling to a network link 620 that is connected to a local network 622. For example, communication interface 618 may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 618 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN (or WAN component to be communicated with a WAN). Wireless links may also be implemented. In any such implementation, communication interface 618 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
Network link 620 typically provides data communication through one or more networks to other data devices. For example, network link 620 may provide a connection through local network 622 to a host computer 624 or to data equipment operated by an Internet Service Provider (ISP) 626. ISP 626 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the “Internet” 628. Local network 622 and Internet 628 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 620 and through communication interface 618, which carry the digital data to and from the CAPTCHA system 100, are example forms of transmission media.
A network, such as the network 160 of FIG. 1, may comprise, but is not limited to, one or more local area networks, wide area network, wireless local area network, wireless wide area network, the Internet, or any combination thereof.
In some embodiments, there may be some variations of communication. For example, the Hypertext Transfer Protocol (“HTTP”) may be used for communication through the network 160, which may correspond to the Internet and/or any combination of networks. For example, the website request 112, CAPTCHA plugin 114, CAPTCHA request and/or data 116, user interaction data 118, and/or a validation request and/or response 120 of FIG. 1 may be sent through the network 160 through HTTP requests and/or responses. In some embodiments, the CAPTCHA environment 190 may not comprise a third party web server 110 of FIG. 1. For example, the user computing device 102 of FIG. 1 may communicate with the CAPTCHA system 110 without the third party web server 110 as an intermediary. In some embodiments, the CAPTCHA system may be used without the use of the Internet. The CAPTCHA system may communicate directly with the user computing device 102 without the use of the Internet. For example, the request 112 may not be a website request but rather a CAPTCHA plugin request.
The CAPTCHA system 100 can send messages and receive data, including program code, through the network(s), network link 620 and communication interface 618. In the Internet example, a server 630 might transmit a requested code for an application program through Internet 628, ISP 626, local network 622 and communication interface 618.
The received code may be executed by processor(s) 604 as it is received, and/or stored in storage device 510, or other non-volatile storage for later execution.
Each of the processes, methods, and algorithms described in the preceding sections may be embodied in, and fully or partially automated by, code instructions executed by one or more computer systems or computer processors comprising computer hardware. The processes and algorithms may be implemented partially or wholly in application-specific circuitry.
The various features and processes described above may be used independently of one another, or may be combined in various ways. All possible combinations and subcombinations are intended to fall within the scope of this disclosure. In addition, certain method or process blocks may be omitted in some implementations. The methods and processes described herein are also not limited to any particular sequence, and the blocks or states relating thereto can be performed in other sequences that are appropriate. For example, described blocks or states may be performed in an order other than that specifically disclosed, or multiple blocks or states may be combined in a single block or state. The example blocks or states may be performed in serial, in parallel, or in some other manner. Blocks or states may be added to or removed from the disclosed example embodiments. The example systems and components described herein may be configured differently than described. For example, elements may be added to, removed from, or rearranged compared to the disclosed example embodiments.
Conditional language, such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.
Any process descriptions, elements, or blocks in the flow diagrams described herein and/or depicted in the attached figures should be understood as potentially representing units, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps in the process. Alternate implementations are included within the scope of the embodiments described herein in which elements or functions may be deleted, executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those skilled in the art.
It should be emphasized that many variations and modifications may be made to the above-described embodiments, the elements of which are to be understood as being among other acceptable examples. All such modifications and variations are intended to be included herein within the scope of this disclosure. The foregoing description details certain embodiments of the invention. It will be appreciated, however, that no matter how detailed the foregoing appears in text, the invention can be practiced in many ways. As is also stated above, it should be noted that the use of particular terminology when describing certain features or aspects of the invention should not be taken to imply that the terminology is being re-defined herein to be restricted to including any specific characteristics of the features or aspects of the invention with which that terminology is associated. The scope of the invention should therefore be construed in accordance with the appended claims and any equivalents thereof.

Claims (4)

What is claimed is:
1. A computer system configured to validate heteronym CAPTCHAs, the computer system comprising:
one or more hardware processors programmed, via executable code instructions, to implement:
a CAPTCHA generator module configured to:
determine a phrase of words that, when perceived together, comprises one or more meanings associated with the phrase of words that assist human perception of the phrase of words, and further comprises a heteronym having a particular meaning, of multiple possible meanings for the heteronym, in conjunction with use in the phrase of words; and
generate a heteronym CAPTCHA user interface depicting:
the phrase of words including the heteronym, wherein the heteronym is configured for human perception as to the particular meaning of the heteronym based on context of the heteronym within the phrase of words, and
at least two options associated with respective two or more meanings for the heteronym, wherein at least one of the options is associated with the particular meaning of the heteronym within the phrase of words and at least one of the options is associated with an incorrect meaning of the heteronym within the phrase of words;
a human validator module configured to:
receive a selection of at least one of the options associated with the heteronym CAPTCHA user interface;
determine whether the selected option is the option associated with the particular meaning of the heteronym within the phrase of words;
generate an indication of whether the selected option was provided by a human based on said determination; and
transmit the generated indication.
2. The computer system of claim 1, wherein the heteronym CAPTCHA user interface is configured for display as part of a website.
3. The computer system of claim 1, wherein the heteronym CAPTCHA user interface further comprises playable audio data corresponding to the phrase of words including the heteronym.
4. The computer system of claim 1, wherein the heteronym CAPTCHA user interface is delivered via a text message to a user computing device.
US14/641,068 2013-01-04 2015-03-06 Captcha systems and methods Active US9166974B2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US14/641,068 US9166974B2 (en) 2013-01-04 2015-03-06 Captcha systems and methods
US14/887,227 US9467436B2 (en) 2013-01-04 2015-10-19 Captcha systems and methods
US15/289,767 US9860247B2 (en) 2013-01-04 2016-10-10 CAPTCHA systems and methods
US15/852,740 US10298569B2 (en) 2013-01-04 2017-12-22 CAPTCHA systems and methods

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201361749185P 2013-01-04 2013-01-04
US14/147,253 US8978121B2 (en) 2013-01-04 2014-01-03 Cognitive-based CAPTCHA system
US14/641,068 US9166974B2 (en) 2013-01-04 2015-03-06 Captcha systems and methods

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/147,253 Continuation US8978121B2 (en) 2013-01-04 2014-01-03 Cognitive-based CAPTCHA system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/887,227 Continuation US9467436B2 (en) 2013-01-04 2015-10-19 Captcha systems and methods

Publications (2)

Publication Number Publication Date
US20150180856A1 US20150180856A1 (en) 2015-06-25
US9166974B2 true US9166974B2 (en) 2015-10-20

Family

ID=51062079

Family Applications (5)

Application Number Title Priority Date Filing Date
US14/147,253 Active US8978121B2 (en) 2013-01-04 2014-01-03 Cognitive-based CAPTCHA system
US14/641,068 Active US9166974B2 (en) 2013-01-04 2015-03-06 Captcha systems and methods
US14/887,227 Active US9467436B2 (en) 2013-01-04 2015-10-19 Captcha systems and methods
US15/289,767 Active US9860247B2 (en) 2013-01-04 2016-10-10 CAPTCHA systems and methods
US15/852,740 Active US10298569B2 (en) 2013-01-04 2017-12-22 CAPTCHA systems and methods

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/147,253 Active US8978121B2 (en) 2013-01-04 2014-01-03 Cognitive-based CAPTCHA system

Family Applications After (3)

Application Number Title Priority Date Filing Date
US14/887,227 Active US9467436B2 (en) 2013-01-04 2015-10-19 Captcha systems and methods
US15/289,767 Active US9860247B2 (en) 2013-01-04 2016-10-10 CAPTCHA systems and methods
US15/852,740 Active US10298569B2 (en) 2013-01-04 2017-12-22 CAPTCHA systems and methods

Country Status (2)

Country Link
US (5) US8978121B2 (en)
WO (1) WO2014107618A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190018937A1 (en) * 2017-07-17 2019-01-17 Tata Consultancy Services Limited Systems and methods for inclusive captcha

Families Citing this family (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9842204B2 (en) 2008-04-01 2017-12-12 Nudata Security Inc. Systems and methods for assessing security risk
EP2266252B1 (en) 2008-04-01 2018-04-25 Nudata Security Inc. Systems and methods for implementing and tracking identification tests
US8744119B2 (en) 2011-01-12 2014-06-03 Gary S. Shuster Graphic data alteration to enhance online privacy
US11080513B2 (en) 2011-01-12 2021-08-03 Gary S. Shuster Video and still image data alteration to enhance privacy
WO2014142835A1 (en) 2013-03-13 2014-09-18 Intel Corporation User authentication via image manipulation
US10212266B2 (en) * 2014-03-07 2019-02-19 Dialogtech Inc. Phone fraud deterrence system for use with toll free and other fee generating numbers
US9338162B2 (en) * 2014-06-13 2016-05-10 International Business Machines Corporation CAPTCHA challenge incorporating obfuscated characters
KR102255369B1 (en) * 2014-08-18 2021-05-24 삼성전자주식회사 Method for providing alternative service and electronic device thereof
US9723005B1 (en) * 2014-09-29 2017-08-01 Amazon Technologies, Inc. Turing test via reaction to test modifications
US9767263B1 (en) 2014-09-29 2017-09-19 Amazon Technologies, Inc. Turing test via failure
US20160173527A1 (en) * 2014-12-10 2016-06-16 NxLabs Limited Method and system for protecting against mobile distributed denial of service attacks
CN104821934B (en) * 2015-03-20 2018-11-20 百度在线网络技术(北京)有限公司 Vocal print login method and device based on artificial intelligence
CN106156597A (en) * 2015-04-16 2016-11-23 深圳市腾讯计算机系统有限公司 The implementation method of a kind of identifying code, and device
US9786277B2 (en) 2015-09-07 2017-10-10 Voicebox Technologies Corporation System and method for eliciting open-ended natural language responses to questions to train natural language processors
US9734138B2 (en) 2015-09-07 2017-08-15 Voicebox Technologies Corporation System and method of annotating utterances based on tags assigned by unmanaged crowds
US9448993B1 (en) 2015-09-07 2016-09-20 Voicebox Technologies Corporation System and method of recording utterances using unmanaged crowds for natural language processing
US9401142B1 (en) 2015-09-07 2016-07-26 Voicebox Technologies Corporation System and method for validating natural language content using crowdsourced validation jobs
US9519766B1 (en) 2015-09-07 2016-12-13 Voicebox Technologies Corporation System and method of providing and validating enhanced CAPTCHAs
US9977892B2 (en) 2015-12-08 2018-05-22 Google Llc Dynamically updating CAPTCHA challenges
US10038504B2 (en) 2015-12-29 2018-07-31 Nokia Of America Corporation Optical network span sensing
US9774877B2 (en) * 2016-01-08 2017-09-26 Dell Products L.P. Digital watermarking for securing remote display protocol output
US10044710B2 (en) * 2016-02-22 2018-08-07 Bpip Limited Liability Company Device and method for validating a user using an intelligent voice print
CN107154924B (en) 2016-03-04 2021-01-05 阿里巴巴集团控股有限公司 Verification processing method and device based on verification code
US11138306B2 (en) * 2016-03-14 2021-10-05 Amazon Technologies, Inc. Physics-based CAPTCHA
US10356073B2 (en) * 2016-08-29 2019-07-16 Cisco Technology, Inc. Secure captcha test
US10339960B2 (en) * 2016-10-13 2019-07-02 International Business Machines Corporation Personal device for hearing degradation monitoring
CN106899411B (en) * 2016-12-08 2021-09-21 创新先进技术有限公司 Verification method and device based on verification code
US10389707B2 (en) * 2017-01-30 2019-08-20 International Business Machines Corporation System, method and computer program product for generating a cognitive one-time password
WO2018165719A1 (en) * 2017-03-17 2018-09-20 SwipeAds Holdings Pty Ltd Method and system for distinguishing human users from automated agents in a computing environment
US10127373B1 (en) * 2017-05-05 2018-11-13 Mastercard Technologies Canada ULC Systems and methods for distinguishing among human users and software robots
US10594836B2 (en) * 2017-06-30 2020-03-17 Microsoft Technology Licensing, Llc Automatic detection of human and non-human activity
US10803203B2 (en) 2017-08-10 2020-10-13 International Business Machines Corporation Self-configuring expertise verification
US10346606B2 (en) 2017-08-16 2019-07-09 International Business Machines Corporation Generation of a captcha on a handheld touch screen device
US10565385B1 (en) * 2017-08-28 2020-02-18 Amazon Technologies, Inc. Substitute web content generation for detection and avoidance of automated agent interaction
US10431203B2 (en) * 2017-09-05 2019-10-01 International Business Machines Corporation Machine training for native language and fluency identification
US10673859B2 (en) 2017-09-12 2020-06-02 International Business Machines Corporation Permission management
CN108076067B (en) * 2017-12-27 2021-05-18 北京中关村科金技术有限公司 Method and system for authorized crawler configuration simulation login
CN110832485A (en) * 2018-06-07 2020-02-21 北京光合信诚科技有限公司 Method for inputting verification code, hardware wallet and transaction equipment
US10896252B2 (en) 2018-07-03 2021-01-19 International Business Machines Corporation Composite challenge task generation and deployment
KR102010360B1 (en) * 2018-10-08 2019-08-14 넷마블 주식회사 Apparatus and method for deciding dyschromatopsia
US11755749B2 (en) * 2018-11-08 2023-09-12 Royal Bank Of Canada System and method for reverse-Turing bot detection
US11200310B2 (en) * 2018-12-13 2021-12-14 Paypal, Inc. Sentence based automated Turing test for detecting scripted computing attacks
CN110519269B (en) * 2019-08-28 2021-09-21 中国工商银行股份有限公司 Verification method, device and system for image-text click data and mobile terminal
US10839066B1 (en) * 2019-11-25 2020-11-17 Capital One Services, Llc Distinguishing human from machine input using an animation
FR3106949A1 (en) * 2020-01-30 2021-08-06 Orange Process for verifying the human character of a user for access to a service
US12135776B1 (en) * 2022-04-29 2024-11-05 United Services Automobile Association (Usaa) System and method for user-specific captchas
FR3136330A1 (en) * 2022-06-02 2023-12-08 Orange Vocal challenge in the form of a sentence to understand
US12130956B2 (en) 2022-08-30 2024-10-29 Cirque Corporation Human verification with a capacitance module
CN116738407B (en) * 2023-08-14 2023-10-27 北京安天网络安全技术有限公司 Method, device and medium for determining abiotic user

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5991617A (en) * 1996-03-29 1999-11-23 Authentix Network, Inc. Method for preventing cellular telephone fraud
US20080066014A1 (en) * 2006-09-13 2008-03-13 Deapesh Misra Image Based Turing Test
US20090138723A1 (en) * 2007-11-27 2009-05-28 Inha-Industry Partnership Institute Method of providing completely automated public turing test to tell computer and human apart based on image
US20090319270A1 (en) * 2008-06-23 2009-12-24 John Nicholas Gross CAPTCHA Using Challenges Optimized for Distinguishing Between Humans and Machines
US20100228804A1 (en) * 2009-03-04 2010-09-09 Yahoo! Inc. Constructing image captchas utilizing private information of the images
US20110208716A1 (en) * 2010-02-19 2011-08-25 Microsoft Corporation Image-Based CAPTCHA Exploiting Context in Object Recognition
US8495518B2 (en) * 2009-11-09 2013-07-23 International Business Machines Corporation Contextual abnormality CAPTCHAs

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7945952B1 (en) * 2005-06-30 2011-05-17 Google Inc. Methods and apparatuses for presenting challenges to tell humans and computers apart
US7721107B2 (en) 2006-02-10 2010-05-18 Palo Alto Research Center Incorporated Physical token for supporting verification of human presence in an online environment
US8108683B2 (en) * 2006-08-10 2012-01-31 International Business Machines Corporation Mitigating dictionary attacks on password-protected local storage
US20080133348A1 (en) * 2006-12-01 2008-06-05 Yahoo! Inc. System and method for delivering online advertisements using captchas
US8056129B2 (en) * 2007-04-19 2011-11-08 International Business Machines Corporation Validating active computer terminal sessions
US9058765B1 (en) * 2008-03-17 2015-06-16 Taaz, Inc. System and method for creating and sharing personalized virtual makeovers
US20090249477A1 (en) * 2008-03-28 2009-10-01 Yahoo! Inc. Method and system for determining whether a computer user is human
US20090328163A1 (en) * 2008-06-28 2009-12-31 Yahoo! Inc. System and method using streaming captcha for online verification
US8245277B2 (en) * 2008-10-15 2012-08-14 Towson University Universally usable human-interaction proof
US8237743B2 (en) * 2009-02-17 2012-08-07 Xerox Corporation Modification of images from a user's album for spot-the-differences
US8516606B2 (en) 2009-03-24 2013-08-20 Aol Inc. Systems and methods for challenge-response animation and randomization testing
US9805020B2 (en) * 2009-04-23 2017-10-31 Deep Sky Concepts, Inc. In-context access of stored declarative knowledge using natural language expression
US20110081640A1 (en) * 2009-10-07 2011-04-07 Hsia-Yen Tseng Systems and Methods for Protecting Websites from Automated Processes Using Visually-Based Children's Cognitive Tests
US8707453B2 (en) 2010-01-29 2014-04-22 Christopher Liam Ivey System and method for restricting access to a computer system to live persons by means of semantic association of images
US8640212B2 (en) * 2010-05-27 2014-01-28 Red Hat, Inc. Securing passwords with CAPTCHA based hash when used over the web
US8990959B2 (en) * 2010-05-28 2015-03-24 Microsoft Corporation Manipulable human interactive proofs
US8898740B2 (en) 2010-06-28 2014-11-25 International Business Machines Corporation Mask based challenge response test
US20120023549A1 (en) * 2010-07-23 2012-01-26 Academia Sinica CAPTCHA AND reCAPTCHA WITH SINOGRAPHS
EP2472428B1 (en) * 2010-08-31 2019-06-12 Rakuten, Inc. Response determining device, response determining method, response determining program, recording medium and response determining system
SG188531A1 (en) * 2010-09-24 2013-04-30 Univ Singapore Methods and systems for automated text correction
US20120323700A1 (en) 2011-06-20 2012-12-20 Prays Nikolay Aleksandrovich Image-based captcha system
US9262527B2 (en) * 2011-06-22 2016-02-16 New Jersey Institute Of Technology Optimized ontology based internet search systems and methods
US9105128B2 (en) * 2011-08-26 2015-08-11 Skybox Imaging, Inc. Adaptive image acquisition and processing with image analysis feedback
US8881005B2 (en) * 2012-04-20 2014-11-04 King Abdulaziz City For Science And Technology Methods and systems for large-scale statistical misspelling correction
US9087044B2 (en) * 2012-08-30 2015-07-21 Wal-Mart Stores, Inc. Establishing “is a” relationships for a taxonomy
US8826382B2 (en) * 2012-09-14 2014-09-02 Apple Inc. Antibot mechanisms optimized for mobile computing
US9721086B2 (en) * 2013-03-15 2017-08-01 Advanced Elemental Technologies, Inc. Methods and systems for secure and reliable identity-based computing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5991617A (en) * 1996-03-29 1999-11-23 Authentix Network, Inc. Method for preventing cellular telephone fraud
US20080066014A1 (en) * 2006-09-13 2008-03-13 Deapesh Misra Image Based Turing Test
US20090138723A1 (en) * 2007-11-27 2009-05-28 Inha-Industry Partnership Institute Method of providing completely automated public turing test to tell computer and human apart based on image
US20090319270A1 (en) * 2008-06-23 2009-12-24 John Nicholas Gross CAPTCHA Using Challenges Optimized for Distinguishing Between Humans and Machines
US20100228804A1 (en) * 2009-03-04 2010-09-09 Yahoo! Inc. Constructing image captchas utilizing private information of the images
US8495518B2 (en) * 2009-11-09 2013-07-23 International Business Machines Corporation Contextual abnormality CAPTCHAs
US20110208716A1 (en) * 2010-02-19 2011-08-25 Microsoft Corporation Image-Based CAPTCHA Exploiting Context in Object Recognition

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190018937A1 (en) * 2017-07-17 2019-01-17 Tata Consultancy Services Limited Systems and methods for inclusive captcha
US10915610B2 (en) * 2017-07-17 2021-02-09 Tata Consultancy Services Limited Systems and methods for inclusive captcha

Also Published As

Publication number Publication date
WO2014107618A1 (en) 2014-07-10
US20180124045A1 (en) 2018-05-03
US8978121B2 (en) 2015-03-10
US9860247B2 (en) 2018-01-02
US20160112393A1 (en) 2016-04-21
US20150180856A1 (en) 2015-06-25
US9467436B2 (en) 2016-10-11
US20170026367A1 (en) 2017-01-26
US10298569B2 (en) 2019-05-21
US20140196133A1 (en) 2014-07-10

Similar Documents

Publication Publication Date Title
US10298569B2 (en) CAPTCHA systems and methods
US10997361B1 (en) Modular systems and methods for selectively enabling cloud-based assistive technologies
US10867120B1 (en) Modular systems and methods for selectively enabling cloud-based assistive technologies
CN110020059B (en) System and method for inclusive CAPTCHA
US9911001B2 (en) Automatic SQL query modification for data restriction
Mantovani et al. {RE-Mind}: a first look inside the mind of a reverse engineer
US8869246B2 (en) Mask based challenge response test
Shirali-Shahreza et al. Accessibility of CAPTCHA methods
Miesenberger et al. Computers Helping People with Special Needs: 15th International Conference, ICCHP 2016, Linz, Austria, July 13-15, 2016, Proceedings, Part I
Dhanoa et al. A process model for dashboard onboarding
CN112948788A (en) Voice verification method, device, computing equipment and medium
Alnfiai Evaluating the accessibility and usability of a universal CAPTCHA based on gestures for smartphones
Napoli Accessible and usable security: Exploring visually impaired users’ online security and privacy strategies
Samonte et al. A psychotherapy telemedicine system using sensory substitution feature for audio-based interventions with security posture evaluation
WO2016018195A1 (en) Method for learning linguistic units of a foreign language
US11785094B2 (en) Secure content delivery computer system
US20240282209A1 (en) Automated customization virtual ecosystem
Domition et al. Improved Mechanism for Detecting Examinations Impersonations in Public Higher Learning Institutions: Case of the Mwalimu Nyerere Memorial Academy (MNMA)
Caputo Recording and analysing data on the neurological consequences of Long Covid using a web app
Van Balen et al. GridMap: enhanced security in cued-recall graphical passwords
Sanjeetha et al. Virtual Scribe for Visually Impaired Learners Through Interactive Speech-Based Application
Potluri A Paradigm Shift in Nonvisual Programming
Kiziloz et al. Towards making accessible human-interaction proofs more secure and usable
WO2022040174A1 (en) Secure content delivery computer system
Chityala et al. A System to Transcribe Documents in European Languages with Human Help

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: SURCHARGE FOR LATE PAYMENT, SMALL ENTITY (ORIGINAL EVENT CODE: M2554); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: 7.5 YR SURCHARGE - LATE PMT W/IN 6 MO, SMALL ENTITY (ORIGINAL EVENT CODE: M2555); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 8